[144917] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Barker, Elaine B.] NIST Publication Announcements

daemon@ATHENA.MIT.EDU (dan@geer.org)
Fri Oct 2 13:26:15 2009

From: dan@geer.org
To: "Perry E. Metzger" <perry@piermont.com>
cc: cryptography@metzdowd.com
In-Reply-To: Your message of "Thu, 01 Oct 2009 10:46:23 EDT."
             <87vdizjhog.fsf@snark.cb.piermont.com> 
Date: Thu, 01 Oct 2009 11:52:21 -0400


 > It is also completely impossible to prove you've deleted a
 > record. Someone who can read the record can always make a copy
 > of it. Cryptography can't fix the DRM problem.


If, and only if, the document lives solely within an
airtight surveillance system, then it is possible to
prove deletion.  Put differently, only within airtight
surveillance will the absence of evidence be the
evidence of absence.

In factually, if not politically, correct terms, the
Electronic Health Record is the surest path to a
surveillance state, but I digress.

--dan

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post