[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Devil's Advocate (again)
DCF wrote:
| Additionally, since properly executed crypto can only be breached by the
| application of torture to the key holder, The VIIIth Amendment's
| prohibition of cruel and unusual punishment may apply.
There are a number of good ways to breach modern cryptography without
torture. They include:
Van Eck (Tempest) monitoring.
Sodium pentathol & its more modern cousins.
Bribery.
Blackmail.
Adam
--
Adam Shostack [email protected]
Politics. From the greek "poly," meaning many, and ticks, a small,
annoying bloodsucker.