1996-11-08 - Re: Why is cryptoanarchy irreversible?

Header Data

From: Jim McCoy <mccoy@communities.com>
To: cypherpunks@toad.com
Message Hash: d2c6acda3652d0e83a3fd3eecf46dcaad9e1ee392ef7909a38f1bafa949d54d5
Message ID: <v03007808aea835cf8016@[205.162.51.35]>
Reply To: <v02140b10aea81624d693@[192.0.2.1]>
UTC Datetime: 1996-11-08 01:14:42 UTC
Raw Date: Thu, 7 Nov 1996 17:14:42 -0800 (PST)

Raw message

From: Jim McCoy <mccoy@communities.com>
Date: Thu, 7 Nov 1996 17:14:42 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Why is cryptoanarchy irreversible?
In-Reply-To: <v02140b10aea81624d693@[192.0.2.1]>
Message-ID: <v03007808aea835cf8016@[205.162.51.35]>
MIME-Version: 1.0
Content-Type: text/plain


Peter Hendrickson wrote:
>Daniel T. Hagan wrote:
[...]
>>> If strong cryptography were unpopular and highly illegal, very few
>>> people would be using it.  This makes it easy to identify suspects.
>>
>> Or suppose that some one uses strong cryptography and then wraps it in
>> weak cryptography.  The outer shell would seem legal, and the authorities
>> can't go around randomly breaking people's keys (or so one would assume),
>> and even if they did, it wouldn't necessarily be legal as evidence anyway.
>
>In the extreme case, everybody would be sending messages in the clear.
>In the case of mandatory GAK, it would be easy to open a bunch of
>messages and see if what was inside looked like cryptography.  The
>privacy violation could be minimized by requiring a Congressionally
>approved test program to applied without any human reading it.  If
>the test program said it was cryptography, then this could be considered
>just cause for a judge to issue a warrant to the authorities for the
>study of the actual message.

Getting a program to recognize a subliminal message channel is even
harder than teaching a human to do so, check out the book Disappearing
Cryptography or do a web search for "mimic functions" to see how easy it
is to hide messages in text which a program parses as regular English.
The other problem is that more and more of the data being tossed around
the net are images and sound files in which it is incredibly easy to
hide encrypted messages.

>The laws regarding what is considered legal evidence are easily
>changed if there is a need for it.  Probably they don't need to be
>changed all that much.  If you see a lot of PGP messages coming
>from somebody, you get a warrant and search their computer for
>illegal software.  When you find it, you lock them up forever.

And if there was a penalty for using PGP then PGP would hide the fact
that such messages were being sent; that -----BEGIN PGP MESSAGE-----
line in the program output does not need to be there you know... Check
out Stealth PGP for an example.

[...]
>In the absence of strong cryptography, remailers do not offer much
>anonymity.

Except for the fact that US law stops at the US border (modulo kidnapping
Mexican doctors or strongarming the rest of the world to obey US
dictates...)  Information, on the other hand, is very easy to transport
across national boundaries and such transmission is impossible to stop.
With remailers outside the US I can send a message to a free nation and
have it delivered to whomever I want.

jim







Thread