I have a question on what seems to be a defect in the Applied
Cryptography book, and I couldn't get an answer out of Schneier or the
cypherpunks mailing list. Could any of you please clarify my issue?
My question is regarding Schneier's write up of SKID3 on page 56. He
states that the protocol
* Tim Dierks [EMAIL PROTECTED] [2003-03-02 12:27]:
This would seem to imply to me that the wiretap act does not apply to any
normal telephone conversation which is carried at any point in its transit
by an electronic switch, including all cell phone calls and nearly all
wireline calls,