On Friday 07 February 2003 16:22, Mike Rosing wrote:
> On Fri, 7 Feb 2003, Michael Cardenas wrote:
> > If secret searches with secret warrants are legal now, what good is
> > it to use public key encryption and keep a backup of your private
> > key at home on a floppy?
> >
> > Is there a protocol to have a "blinded" private key, so you
> > wouldn't actually have access to your own private key?
>
> If you use ECC you don't need to keep anything but your pass phrase
> in your head.  It does help to not lose your head, so don't fly on a
> space shuttle :-)

I'd be more interested in a system in which I didn't have access to my 
own key. Warrant-proof, contempt-proof and preferably rubber 
hose-proof. Maybe a decryption program connected to a voice stress 
analyzer.

Legal question: If Alice selected and used a system in which she 
wouldn't be _able_ to provide the decryption key or the decrypted 
documents on demand, would she still be liable under contempt or 
criminal charges for not providing them? Maybe she used a dongle with 
the key, which erased itself if not activated every 24 hours. Emphasis 
on her not taking any action to delete files or erase a key after being 
served or arrested. I'm mainly interested in US law, but would be 
interested in other jurisdictions, too.

-- 
Steve Furlong    Computer Condottiere   Have GNU, Will Travel

You don't expect governments to obey the law because of some higher
moral development. You expect them to obey the law because they know
that if they don't, those who aren't shot will be hanged.
    --Michael Shirley

Reply via email to