[5677] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Why did White House change its mind on crypto?

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Sun Sep 19 11:57:37 1999

From: "Steven M. Bellovin" <smb@research.att.com>
To: hgoodell@cs.uml.edu
Cc: Ben Laurie <ben@algroup.co.uk>, cryptography@c2.net,
        cypherpunks <cypherpunks@cyberpass.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Sat, 18 Sep 1999 20:24:48 -0400
Message-Id: <19990919002454.3ABD441F16@SIGABA.research.att.com>

In message <37E411B0.89FDEDE6@mediaone.net>, Howie Goodell writes:

> It's (2) that's the real problem.  They have this message they
> claim came from you, but the link to you is secret (maliced
keyboards; Windows 2000 backdoors, etc.)  This has nothing to do
> with encryption -- since the evidence is plaintext -- it's a
> bugging case.  However unlike wiretaps, a seized plaintext is
> not self-authenticating, unless you signed it with a private key
> the jury believes the Government didn't steal (hard to believe;
> how do we know they didn't watch you type your password and then
> fake the signature?)  So if I were on a jury, why should I
> believe them?

I'm not a lawyer, but...

It's always possible to challenge the authenticity of evidence.  The 
government may not have to explain how they got it (though as I noted, I think 
there's a good chance for a constitutional challenge here), but that won't 
stop a clever defense attorney from casting doubt on it -- say, by pointing 
out that Mark Furhman helped with the cryptanalysis....

		--Steve Bellovin




home help back first fref pref prev next nref lref last post