Rich Kulawiec <r...@gsp.org> writes: > Fourth, the simultaneous requirement that systems be backdoored > and searchable while their disks are encrypted strongly suggests > that they intend to have a central repository of encryption keys. > > Fifth, the requirement for use of centralized backup also provides > one-stop shopping to an attacker.
Thank you for your reply. The fact that you have this environment of pervasive searching personal property, coupled with incremental backups, means that people can be targeted due to having "objectionable" material at some time in the past. It creates a stifling environment where people will be afraid to express themselves, least it becomes a future liability. My $0.02, ~Tomer -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.