On Wed, Jul 12, 2017 at 11:18 AM, Stephen Farrell <[email protected] > wrote:
> > If one endpoint is feeding > > cryptographic material to a third party (the only way that information > gets > > out to the third party, vulnerabilities notwithstanding), they are > > collaborating, not enabling wiretapping. > > That's nonsense. In the POTS case, telcos are collaborating > with their local LEAs and that is wiretapping. The telco in the POTS case isn't either endpoint. The third-party surveillance is unknown to those endpoints. Therefore: wiretapping. Kyle
_______________________________________________ TLS mailing list [email protected] https://www.ietf.org/mailman/listinfo/tls
