[9370] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

daemon@ATHENA.MIT.EDU (David Honig)
Mon Sep 17 21:59:52 2001

Message-Id: <3.0.6.32.20010917174032.008b06e0@pop.sprynet.com>
Date: Mon, 17 Sep 2001 17:40:32 -0700
To: (Recipient list suppressed)
From: David Honig <honig@sprynet.com>
In-Reply-To: <IFHJIBODIBPGJBAA@shared1-mail.whowhere.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 02:14 PM 9/17/01 -0400, Jim Windle wrote:
>Second, if we assume for a minute that the terrorist use public key
>systems 

Given their 1. quality opsec including 2. wise avoidance of wireless
phones, etc, and their
3. dependence on long-time personal contacts, isn't it more likely that
private keys
on floppies (or CDs) would be used?  3. is hardest and most valuable.  The
fact
that they are 4. ideologically motivated, (rather than financially or by ego)
makes it even tougher.

If a *utility knife* is a *skyscraper disassembly tool*, worrying about the
code
is irrelevent.







 






  







---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post