Judge orders defendant to decrypt PGP-protected laptop
Sampo Syreeni
decoy at iki.fi
Tue Mar 3 13:58:30 EST 2009
On 2009-03-03, Stephan Somogyi wrote:
> There is a chasm of difference between being compelled to produce
> keys, which could be subsequently reused with other encrypted
> material, and being compelled to produce specific unencrypted data,
> which is much more narrowly scoped and therefore less intrusive.
That is also why multi-level security and/or steganography exist. And
why, eventually, every court order will mandate randomization of all
data that wasn't decryptable. And why people will design stealthy
methods of signaling to their disk that such deletion orders are to be
disrespected. And why such drives will be forthwith banned. Et cetera,
ad nauseam.
So it goes.
--
Sampo Syreeni, aka decoy - decoy at iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list