[9370] in cryptography@c2.net mail archive
daemon@ATHENA.MIT.EDU (David Honig)
Mon Sep 17 21:59:52 2001
Message-Id: <3.0.6.32.20010917174032.008b06e0@pop.sprynet.com>
Date: Mon, 17 Sep 2001 17:40:32 -0700
To: (Recipient list suppressed)
From: David Honig <honig@sprynet.com>
In-Reply-To: <IFHJIBODIBPGJBAA@shared1-mail.whowhere.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
At 02:14 PM 9/17/01 -0400, Jim Windle wrote:
>Second, if we assume for a minute that the terrorist use public key
>systems
Given their 1. quality opsec including 2. wise avoidance of wireless
phones, etc, and their
3. dependence on long-time personal contacts, isn't it more likely that
private keys
on floppies (or CDs) would be used? 3. is hardest and most valuable. The
fact
that they are 4. ideologically motivated, (rather than financially or by ego)
makes it even tougher.
If a *utility knife* is a *skyscraper disassembly tool*, worrying about the
code
is irrelevent.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com