At 02:14 PM 9/17/01 -0400, Jim Windle wrote:
>Second, if we assume for a minute that the terrorist use public key
>systems
Given their 1. quality opsec including 2. wise avoidance of wireless
phones, etc, and their
3. dependence on long-time personal contacts, isn't it more likely that
private keys
on floppies (or CDs) would be used? 3. is hardest and most valuable. The
fact
that they are 4. ideologically motivated, (rather than financially or by ego)
makes it even tougher.
If a *utility knife* is a *skyscraper disassembly tool*, worrying about the
code
is irrelevent.