On Fri, 7 Feb 2003, Steve Furlong wrote: > I'd be more interested in a system in which I didn't have access to my > own key. Warrant-proof, contempt-proof and preferably rubber > hose-proof. Maybe a decryption program connected to a voice stress > analyzer.
If you don't have access then someone else does. The latter can be done with ECC tho, so the combination makes sense. You block wetware function algorithmicly. That can still be fooled, it's just more complicated. > Legal question: If Alice selected and used a system in which she > wouldn't be _able_ to provide the decryption key or the decrypted > documents on demand, would she still be liable under contempt or > criminal charges for not providing them? Maybe she used a dongle with > the key, which erased itself if not activated every 24 hours. Emphasis > on her not taking any action to delete files or erase a key after being > served or arrested. I'm mainly interested in US law, but would be > interested in other jurisdictions, too. A dead man switch basicly. Or watchdog timer. It'd be a pain in the butt and never actually used by real people. The 5th still works, but only if you're employed by the government :-) Patience, persistence, truth, Dr. mike
