[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Devil's Advocate (again)



DCF wrote:

| Additionally, since properly executed crypto can only be breached by the 
| application of torture to the key holder, The VIIIth Amendment's 
| prohibition of cruel and unusual punishment may apply.

There are a number of good ways to breach modern cryptography without
torture.  They include:

Van Eck (Tempest) monitoring.
Sodium pentathol & its more modern cousins.
Bribery.
Blackmail.


Adam

-- 
Adam Shostack 				       [email protected]

Politics.  From the greek "poly," meaning many, and ticks, a small,
annoying bloodsucker.