[70104] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Buying and selling root certificates

daemon@ATHENA.MIT.EDU (Robert M. Enger)
Thu Apr 29 06:10:14 2004

Date: Thu, 29 Apr 2004 14:04:40 +0400
To: Iljitsch van Beijnum <iljitsch@muada.com>,
	"Stephen Sprunk" <stephen@sprunk.org>
From: "Robert M. Enger" <enger@comcast.net>
Cc: North American Noise and Off-topic Gripes <nanog@merit.edu>
In-Reply-To: <5B670096-99AC-11D8-989E-000A95CD987A@muada.com>
Errors-To: owner-nanog-outgoing@merit.edu


At 11:10 AM 4/29/2004, Iljitsch van Beijnum wrote:

>On 29-apr-04, at 7:02, Stephen Sprunk wrote:
>
>>The feds clearly have the power to get through or around encryption
>>suspected criminals are using: the FBI reports that there have been _zero_
>>cases nationwide over the past several years where the use of encryption has
>>prevented them or other agencies from obtaining the evidence needed, even
>>when "secure" tools like PGP, SSL, or IPsec are used.
>
>I have a hard time believing this...
>
>So what do they do? Send a team in to retrieve the key from your system? 
>Borrow some CPU time from the NSA?


They secretly enter your house and put a hardware monitor on your keyboard 
to collect your passphrase as you type it in.
http://www.wired.com/news/privacy/0,1848,49455,00.html

If you use the NSA, then you can't prosecute.  The NSA won't testify in 
court, because they won't divulge what their true capabilities are.
So, you only use the NSA when the knowledge is more important than being 
able to prosecute.


Maybe this will cut down on unemployment a little:
The Watergate burglars now have job opportunities   :-)



home help back first fref pref prev next nref lref last post