John Schwartz writes in the December 31 New York Times:
A controversial system installed on a criminal suspect's
computer by the government to capture the encryption
passwords of a criminal suspect is nearing its second
phase.
Anybody have info or leads on the second phase of
what appears
At 2:59 PM -0800 12/30/01, John Gilmore wrote:
Along these lines I can't help but recommend reading one of the best
crypto books of the last few years:
Between Silk and Cyanide
Leo Marks, 1999
This wonderful, funny, serious, and readable book was written by the
chief