As recently as two weeks ago, the Administration was pushing for key escrow coding approaches to data scrambling.
Thereafter the policy climate for key escrow turned negative [2], market interest waned, and the system was never built.
By 1999, however, only the security services still hankered after key escrow.
If an encryption key is lost, a backup or key escrow should be utilized to continue viewing encrypted content.
The idea is to give the Government means to override other people's codes, according to a concept called "key escrow."
The difference, of course, is that in his phone there is no key escrow, no back door.
"The Internet of 1998 will provide automatic, secure, and fully private communication, without key escrow, internationally."
But the heart of the concept was key escrow.
Because any user's private key can be generated through the use of the third party's secret, this system has inherent key escrow.
Depending on the context key escrow can be seen as a positive feature (e.g., within Enterprises).