How the Greek cellphone network was tapped.
John Ioannidis
ji at tla.org
Mon Jul 9 20:51:17 EDT 2007
Florian Weimer wrote:
> It's also an open question whether network operators subject to
> interception requirements can legally offer built-in E2E encryption
> capabilities without backdoors.
>
You probably meant device vendors, not network operators. The whole
*point* of E2E security is that network operators are not involved. If
they were, it wouldn't be end-to-end!
/ji
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list