[144329] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Judge orders defendant to decrypt PGP-protected laptop

daemon@ATHENA.MIT.EDU (Sampo Syreeni)
Tue Mar 3 14:06:56 2009

Date: Tue, 3 Mar 2009 20:58:30 +0200 (EET)
From: Sampo Syreeni <decoy@iki.fi>
To: Stephan Somogyi <cryptography@lt.gross.net>
cc: cryptography@metzdowd.com
In-Reply-To: <p06240804c5d32613186a@[192.168.11.12]>

On 2009-03-03, Stephan Somogyi wrote:

> There is a chasm of difference between being compelled to produce 
> keys, which could be subsequently reused with other encrypted 
> material, and being compelled to produce specific unencrypted data, 
> which is much more narrowly scoped and therefore less intrusive.

That is also why multi-level security and/or steganography exist. And 
why, eventually, every court order will mandate randomization of all 
data that wasn't decryptable. And why people will design stealthy 
methods of signaling to their disk that such deletion orders are to be 
disrespected. And why such drives will be forthwith banned. Et cetera, 
ad nauseam.

So it goes.
-- 
Sampo Syreeni, aka decoy - decoy@iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post