On Sun, 12 Feb 2012 05:57:02 -0500
Jeffrey Walton <noloa...@gmail.com> wrote:

> On Sun, Feb 12, 2012 at 5:43 AM, Krassimir Tzvetanov
> <mailli...@krassi.biz> wrote:
> > While I'm not a lawyer and my opinion is in noway authoritive I do
> > not believe there is any violation. They ay be an accessory to a
> > potential crime but they themselves did not do the tapping.
> >
> > Now on the other hand those companies that did the tapping should be
> > OK for as long as they are clear with the employees that they cannot
> > expect privacy, which usually is the case. Usually this is in the
> > paperwork you sing when you start working there in the section
> > privacy policy.
> Two questions:
> 
> (1) How can a company actively attack a secure channel and tamper with
> communications if there are federal laws prohibiting it? It seems to
> me they can only take the role of passive adversaries and still comply
> with US law,

Plenty of companies install monitoring software on their employees'
workstations and listen to employee phone calls, which is generally
legal:

https://www.privacyrights.org/fs/fs7-work.htm

> (2) Did the other end of the SSL/TLS tunnel also agree to be
> monitored?

Does that matter?

-- Ben



-- 
Benjamin R Kreuter
UVA Computer Science
brk...@virginia.edu
KK4FJZ

--

"If large numbers of people are interested in freedom of speech, there
will be freedom of speech, even if the law forbids it; if public
opinion is sluggish, inconvenient minorities will be persecuted, even
if laws exist to protect them." - George Orwell

Attachment: signature.asc
Description: PGP signature

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to