Judge orders defendant to decrypt PGP-protected laptop

Sampo Syreeni decoy at iki.fi
Tue Mar 3 13:58:30 EST 2009


On 2009-03-03, Stephan Somogyi wrote:

> There is a chasm of difference between being compelled to produce 
> keys, which could be subsequently reused with other encrypted 
> material, and being compelled to produce specific unencrypted data, 
> which is much more narrowly scoped and therefore less intrusive.

That is also why multi-level security and/or steganography exist. And 
why, eventually, every court order will mandate randomization of all 
data that wasn't decryptable. And why people will design stealthy 
methods of signaling to their disk that such deletion orders are to be 
disrespected. And why such drives will be forthwith banned. Et cetera, 
ad nauseam.

So it goes.
-- 
Sampo Syreeni, aka decoy - decoy at iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list