It falls somewhere in the area of "If you are worried about physical
access to your system, boobytrap the hull with plastik and have it set to
discharge every 6 hours if it doesn't get a timestamp signed by your
public key."

Or encrypt EVERYTHING and teach yourself a 4*5 character (lowercase and
numbers that's 110 bits or so) random passcode. And then still get fucked
when they manage to lift the info from your ram, tempest your monitor, or
simply put 300 volts through your testicals until you talk.

Or you could just move to a cabin somewhere in forrest in Montana and
start sending loving brown envelopes to judges and technologists (via
good old fashioned snail mail).

On Sun, Aug 20, 2000 at 10:21:22PM -0500, Scott G. Miller wrote:
> > Everybody is missing something here: the plaintext is not private. You see
> > that URL that is printed at the end, the part after the comma is the
> > decryption key, that is what you send to the world. The key is right
> > there, the NSA can request and read it like anybody else. And as far as
> > telling from the disk whether you had the banned data, that can be done
> > just as well from the cyphertext as from the plaintext.
> Yeah, you have a point.  This once again falls under the category of 'Be
> smart, secure your sysetem'.
> 



-- 
\oskar
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 238 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20000821/6cc846d5/attachment.pgp>

Reply via email to