Buying and selling root certificates
David Lesher
wb8foz at nrk.com
Thu Apr 29 14:22:48 UTC 2004
Speaking on Deep Background, the Press Secretary whispered:
>
>
> On 29-apr-04, at 7:02, Stephen Sprunk wrote:
>
> > The feds clearly have the power to get through or around encryption
>
> I have a hard time believing this...
>
> So what do they do? Send a team in to retrieve the key from your
> system? Borrow some CPU time from the NSA?
In the Scarfo case (a small-time Tony Soprano type) they did
multiple black-bag entries to put a keysnatcher on his laptop.
<http://www.epic.org/crypto/scarfo.html>
--
A host is a host from coast to coast.................wb8foz at nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433
More information about the NANOG
mailing list