1994-01-25 - The Packwood Memorial Diary Server

Header Data

From: jim@bilbo.suite.com (Jim Miller)
To: cypherpunks@toad.com
Message Hash: 6f66f8973919de2712fe1088c2e5c438259db12307526633f8bdec3d341a3746
Message ID: <9401252317.AA02935@bilbo.suite.com>
Reply To: N/A
UTC Datetime: 1994-01-25 23:26:53 UTC
Raw Date: Tue, 25 Jan 94 15:26:53 PST

Raw message

From: jim@bilbo.suite.com (Jim Miller)
Date: Tue, 25 Jan 94 15:26:53 PST
To: cypherpunks@toad.com
Subject: The Packwood Memorial Diary Server
Message-ID: <9401252317.AA02935@bilbo.suite.com>
MIME-Version: 1.0
Content-Type: text/plain



I often see threads debating whether the courts have the right to compel  
you to reveal your encryption key.  Some say yes, some say no.

Under the assumption that courts *do* have the right (or power) to force  
you to reveal your key, the problem now becomes:

How can you prevent the government from proving you have encrypted  
documents?

One Answer: Don't keep encrypted documents in your possession.


Somebody could create a Document Server to store encrypted documents.   
Users would somehow get an anonymous Document Server account number when  
they subscribe to the service.  Users would use the remailer system to  
send encrypted documents to the Document Server.  The account numbers  
would be used to organize the document database and for billing (the  
tricky part).


Given a Document Server, the problem now becomes:  How can you prevent the  
government from proving you use a Document Server.  This seems like a  
strictly technical problem, unlike the "can they compel you to reveal your  
key" problem.


Jim_Miller@suite.com






Thread