home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!stanford.edu!ames!purdue!yuma!bentson
- From: bentson@CS.ColoState.EDU (Randolph Bentson)
- Subject: Re: Limits on the Use of Cryptography?
- Sender: news@yuma.ACNS.ColoState.EDU (News Account)
- Message-ID: <Nov15.213603.22514@yuma.ACNS.ColoState.EDU>
- Date: Sun, 15 Nov 1992 21:36:03 GMT
- References: <1992Nov11.061210.9933@cactus.org> <lgdbbbINNrfv@exodus.Eng.Sun.COM>
- Nntp-Posting-Host: vivaldi.cs.colostate.edu
- Organization: Colorado State University, Computer Science Department
- Lines: 22
-
- In article <lgdbbbINNrfv@exodus.Eng.Sun.COM>
- jfarrell@cloudbase (Jerry Farrell) writes:
- >Post-facto demands for a key could be met by
- >stonewalling or legitimate ignorance of a session key; a simple "I
- >don't rmember" sufficed for James R. Hoffa, and would likely reappear
- >as needed. And the penalty for failure to provide a key on (warranted)
- >demand would very likely be less than the penalty for the hidden crime;
- >we could expect some people to accept jail for contempt (or whatever)
- >in lieu of revealing the keys LE would *really* like to see.
-
- Another claim that could be made, which would likely avoid a contempt
- citation, would be "That? Oh, that's random noise I stored to mess
- the minds of snoopy officials."
-
- If this (key registration, whatever) comes to pass, I suspect civil
- libertarians would make a point of storing noise in their personal
- files (or at least claim to do so).
-
- --
- Randolph Bentson Colorado State University
- bentson@CS.ColoState.Edu Computer Science Department
- 303/491-5792 Ft. Collins, CO 80523
-