1994-07-01 - Re: Devil’s Advocate (again)

Header Data

From: Adam Shostack <adam@bwh.harvard.edu>
To: frissell@panix.com (Duncan Frissell)
Message Hash: d664bc27af1665ababaff2e4f99b036b39f6cbc19925620a88eba0c331908023
Message ID: <199407011746.NAA13073@duke.bwh.harvard.edu>
Reply To: <Pine.3.87.9407011344.A15239-0100000@panix.com>
UTC Datetime: 1994-07-01 17:49:41 UTC
Raw Date: Fri, 1 Jul 94 10:49:41 PDT

Raw message

From: Adam Shostack <adam@bwh.harvard.edu>
Date: Fri, 1 Jul 94 10:49:41 PDT
To: frissell@panix.com (Duncan Frissell)
Subject: Re: Devil's Advocate (again)
In-Reply-To: <Pine.3.87.9407011344.A15239-0100000@panix.com>
Message-ID: <199407011746.NAA13073@duke.bwh.harvard.edu>
MIME-Version: 1.0
Content-Type: text/plain


DCF wrote:

| Additionally, since properly executed crypto can only be breached by the 
| application of torture to the key holder, The VIIIth Amendment's 
| prohibition of cruel and unusual punishment may apply.

There are a number of good ways to breach modern cryptography without
torture.  They include:

Van Eck (Tempest) monitoring.
Sodium pentathol & its more modern cousins.
Bribery.
Blackmail.


Adam

-- 
Adam Shostack 				       adam@bwh.harvard.edu

Politics.  From the greek "poly," meaning many, and ticks, a small,
annoying bloodsucker.






Thread