Rich Kulawiec <r...@gsp.org> writes:
> Fourth, the simultaneous requirement that systems be backdoored
> and searchable while their disks are encrypted strongly suggests
> that they intend to have a central repository of encryption keys.
>
> Fifth, the requirement for use of centralized backup also provides
> one-stop shopping to an attacker.

Thank you for your reply.

The fact that you have this environment of pervasive searching personal
property, coupled with incremental backups, means that people can be
targeted due to having "objectionable" material at some time in the
past. It creates a stifling environment where people will be afraid to
express themselves, least it becomes a future liability.

My $0.02,

~Tomer
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to