Buying and selling root certificates

David Lesher wb8foz at nrk.com
Thu Apr 29 14:22:48 UTC 2004


Speaking on Deep Background, the Press Secretary whispered:
> 
> 
> On 29-apr-04, at 7:02, Stephen Sprunk wrote:
> 
> > The feds clearly have the power to get through or around encryption
> 
> I have a hard time believing this...
> 
> So what do they do? Send a team in to retrieve the key from your 
> system? Borrow some CPU time from the NSA?

In the Scarfo case (a small-time Tony Soprano type) they did
multiple black-bag entries to put a keysnatcher on his laptop.

<http://www.epic.org/crypto/scarfo.html>



-- 
A host is a host from coast to coast.................wb8foz at nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433



More information about the NANOG mailing list