No, it's the lack of a credible threat of such a system being put in
place. Once the system is in place it is too late to impliment crypto to
recover.
There are other similar cause-effect logic errors in your arguments as
well.
On Sat, 22 Sep 2001, Ryan Lackey wrote:
> The greatest enemy of secure electronic mail, for instance, being widely
> deployed is the LACK of widespread monitoring. If every internet
> connection in the US were monitored actively, and the contents were
> routinely used in civil and criminal legal actions, technologies
> like ZKS Freedom, PGP, SSL would be in far wider use than they are now.
--
____________________________________________________________________
Kill them all, take their land, and go there for vacation.
Rage Against The Machine
The Armadillo Group ,::////;::-. James Choate
Austin, Tx /:'///// ``::>/|/ [EMAIL PROTECTED]
www.ssz.com .', |||| `/( e\ 512-451-7087
-====~~mm-'`-```-mm --'-
--------------------------------------------------------------------