Buying and selling root certificates
Robert M. Enger
enger at comcast.net
Thu Apr 29 10:04:40 UTC 2004
At 11:10 AM 4/29/2004, Iljitsch van Beijnum wrote:
>On 29-apr-04, at 7:02, Stephen Sprunk wrote:
>
>>The feds clearly have the power to get through or around encryption
>>suspected criminals are using: the FBI reports that there have been _zero_
>>cases nationwide over the past several years where the use of encryption has
>>prevented them or other agencies from obtaining the evidence needed, even
>>when "secure" tools like PGP, SSL, or IPsec are used.
>
>I have a hard time believing this...
>
>So what do they do? Send a team in to retrieve the key from your system?
>Borrow some CPU time from the NSA?
They secretly enter your house and put a hardware monitor on your keyboard
to collect your passphrase as you type it in.
http://www.wired.com/news/privacy/0,1848,49455,00.html
If you use the NSA, then you can't prosecute. The NSA won't testify in
court, because they won't divulge what their true capabilities are.
So, you only use the NSA when the knowledge is more important than being
able to prosecute.
Maybe this will cut down on unemployment a little:
The Watergate burglars now have job opportunities :-)
More information about the NANOG
mailing list