[Cryptography] Proving a Negative (was MAybe he's Adam Back, maybe not)
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Thu Apr 16 22:28:40 EDT 2026
Jon Callas <jon at callas.org> writes:
>He looks up, gets a big smile and says, "Really?" We start having a great
>conversation about passport security; how good is contactless, anyway;
>biometric safety and security; and more.
Our customs guys are pretty cool, usually you just get waved through but if
it's not busy you can have a chat with them about all sorts of stuff. I
always put down "IT" as my occupation on the arrival card and one time ended
up in a discussion about the pros and cons of going back to banking work
maintaining COBOL programs, which is what she'd originally done.
>He gets thoughtful for a few seconds and then says, "I guess we'd have them
>sit in one of the holding rooms until they convinced us there was no second
>volume."
Many years ago I was at a talk by a law enforcement person who also talked about
Truecrypt. The target of the investigation, not a very nice person, had used
every possible bell and whistle that TrueCrypt provides. They (LE) got in
anyway through "good old-fashioned police work", not a euphemism for beating
them up which in any case I doubt would have worked but surveillance and
taking advantage of the target's lack of OPSEC. This is why I always find it
amusing when someone says "the police will never figure out what's going on if
I use TrueCrypt".
Peter.
More information about the cryptography
mailing list