No subject

David Honig honig at sprynet.com
Mon Sep 17 20:40:32 EDT 2001


At 02:14 PM 9/17/01 -0400, Jim Windle wrote:
>Second, if we assume for a minute that the terrorist use public key
>systems 

Given their 1. quality opsec including 2. wise avoidance of wireless
phones, etc, and their
3. dependence on long-time personal contacts, isn't it more likely that
private keys
on floppies (or CDs) would be used?  3. is hardest and most valuable.  The
fact
that they are 4. ideologically motivated, (rather than financially or by ego)
makes it even tougher.

If a *utility knife* is a *skyscraper disassembly tool*, worrying about the
code
is irrelevent.







 






  







---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list