[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Security flaws introduced by "other readers" in CMR




Adam Back writes:
>You have a dual concern: you are trying to protect against big brother
>and against little brother.

At the technical level, is there a meaningful difference between the
brothers? Aren't we really talking about third-party access to
communications, and second-party access to stored data ... with the
"brother" distinction being one made at a social/political level, as a
judgement about the legitimacy of the access or the size of the actor,
rather than the character of the access?


--
Greg Broiles                | US crypto export control policy in a nutshell:
[email protected]         | Export jobs, not crypto.
http://www.io.com/~gbroiles | http://www.parrhesia.com