How the Greek cellphone network was tapped.

John Ioannidis ji at tla.org
Mon Jul 9 20:51:17 EDT 2007


Florian Weimer wrote:

> It's also an open question whether network operators subject to
> interception requirements can legally offer built-in E2E encryption
> capabilities without backdoors.
> 

You probably meant device vendors, not network operators. The whole 
*point* of E2E security is that network operators are not involved. If 
they were, it wouldn't be end-to-end!

/ji

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list