[158965] in North American Network Operators' Group
Re: William was raided for running a Tor exit node. Please help if
daemon@ATHENA.MIT.EDU (Henry Yen)
Tue Dec 18 02:02:40 2012
Date: Tue, 18 Dec 2012 02:02:24 -0500
From: Henry Yen <henry@AegisInfoSys.com>
To: Jimmy Hess <mysidia@gmail.com>
Mail-Followup-To: Henry Yen <henry@AegisInfoSys.com>,
Jimmy Hess <mysidia@gmail.com>, nanog@nanog.org
In-Reply-To: <CAAAwwbWjinoPZXuE469iyVwatHXm5V_9JB4gsOmgvq4OXFeRNg@mail.gmail.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Mon, Dec 17, 2012 at 20:45:04AM -0600, Jimmy Hess wrote:
> If you _must_ be able to protect data from extreme
> physical threats: keep it encrypted end to end at all times,
Physical threat is somewhat different than seizure by law enforcement, though.
Although mooted when authorities decrypted an evidentiary laptop themselves,
the idea of encryption as a shield against law enforcement is not yet a
settled issue in the US; see the "Fricosu" case. A nice explanation:
https://www.eff.org/deeplinks/2012/03/tale-two-encryption-cases
--
Henry Yen Aegis Information Systems, Inc.
Senior Systems Programmer Hicksville, New York