On 2009-03-03, Stephan Somogyi wrote:

There is a chasm of difference between being compelled to produce keys, which could be subsequently reused with other encrypted material, and being compelled to produce specific unencrypted data, which is much more narrowly scoped and therefore less intrusive.

That is also why multi-level security and/or steganography exist. And why, eventually, every court order will mandate randomization of all data that wasn't decryptable. And why people will design stealthy methods of signaling to their disk that such deletion orders are to be disrespected. And why such drives will be forthwith banned. Et cetera, ad nauseam.

So it goes.
--
Sampo Syreeni, aka decoy - de...@iki.fi, http://decoy.iki.fi/front
+358-50-5756111, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to