1994-07-27 - LITTLE BROTHER INSIDE

Header Data

From: hughes@ah.com (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: bb3a91dea6d6e68b75deca92a27dcf03e09af65536c64b7c25f0f66c1e3e9736
Message ID: <9407270142.AA06673@ah.com>
Reply To: <199407261902.AA14756@osiris.cs.uow.edu.au>
UTC Datetime: 1994-07-27 02:04:25 UTC
Raw Date: Tue, 26 Jul 94 19:04:25 PDT

Raw message

From: hughes@ah.com (Eric Hughes)
Date: Tue, 26 Jul 94 19:04:25 PDT
To: cypherpunks@toad.com
Subject: LITTLE BROTHER INSIDE
In-Reply-To: <199407261902.AA14756@osiris.cs.uow.edu.au>
Message-ID: <9407270142.AA06673@ah.com>
MIME-Version: 1.0
Content-Type: text/plain


   Why not just use an encrypted partition. I guess then it is a problem of
   not being persuaded to reveal the key. What laws/rights does the user have 
   as to revealing the key ? 

If the court order you to produce something, you have to or be in
comptempt.  The court will not order you to testify against yourself.
The court can make you show up with the electronic storage that holds
your keys, for example, because this is a physical device.  So the
issue hinges upon the question of whether uttering a passphrase which
makes the device usable counts as giving testimony.  

Is explaining how something works (aka giving a passphrase) testimony?
Quite possibly not.  The explanation or passphrase is not
incriminating by itself; it says nothing and claims nothing.

One solution to this is to give the passphrase (or other access
information) to someone who won't give it back to you if you are under
duress, investigation, court order, etc.  One would desire that this
entity be in a jurisdiction other than where an investigation might
happen.

Eric





Thread