[70107] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Buying and selling root certificates

daemon@ATHENA.MIT.EDU (David Lesher)
Thu Apr 29 10:18:53 2004

From: David Lesher <wb8foz@nrk.com>
To: nanog@merit.edu (nanog list)
Date: Thu, 29 Apr 2004 10:22:48 -0400 (EDT)
In-Reply-To: <5B670096-99AC-11D8-989E-000A95CD987A@muada.com> from "Iljitsch van Beijnum" at Apr 29, 2004 09:10:55 AM
Reply-To: wb8foz@nrk.com
Errors-To: owner-nanog-outgoing@merit.edu


Speaking on Deep Background, the Press Secretary whispered:
> 
> 
> On 29-apr-04, at 7:02, Stephen Sprunk wrote:
> 
> > The feds clearly have the power to get through or around encryption
> 
> I have a hard time believing this...
> 
> So what do they do? Send a team in to retrieve the key from your 
> system? Borrow some CPU time from the NSA?

In the Scarfo case (a small-time Tony Soprano type) they did
multiple black-bag entries to put a keysnatcher on his laptop.

<http://www.epic.org/crypto/scarfo.html>



-- 
A host is a host from coast to coast.................wb8foz@nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433

home help back first fref pref prev next nref lref last post