On Wed, 10 Aug 2011 11:53:11 -0400 Ken Buchanan
<ken.bucha...@gmail.com> wrote:
> On Tue, Aug 9, 2011 at 8:02 PM, Sampo Syreeni <de...@iki.fi> wrote:
> > Thus, why not turn the Trusted Computing idea on its head? Simply
> > make P2P public key cryptography available to your customers, and
> > then bind your hands behind your back in an Odysseian fasion,
> > using hardware means? Simply make it impossible for even yourself
> > to circumvent the best cryptographic protocol you can invent,
> > which you embed in your device before ever unveiling it, and then
> > just live with it?
> >
> Why not, indeed...
> Because no regulatory regime in the world would allow this.

Funny, that, since Sampo's proposal is more or less how Blackberry
chat actually works. (Various previous posters had the details wrong.)
Also all blackberry corporate services work without RIM having any
access to the content -- they only get access to email for individual
users for whom they terminate the encrypted tunnel.

Perry E. Metzger                pe...@piermont.com
The cryptography mailing list

Reply via email to