From: jim@bilbo.suite.com (Jim Miller)
To: cypherpunks@toad.com
Message Hash: 6f66f8973919de2712fe1088c2e5c438259db12307526633f8bdec3d341a3746
Message ID: <9401252317.AA02935@bilbo.suite.com>
Reply To: N/A
UTC Datetime: 1994-01-25 23:26:53 UTC
Raw Date: Tue, 25 Jan 94 15:26:53 PST
From: jim@bilbo.suite.com (Jim Miller)
Date: Tue, 25 Jan 94 15:26:53 PST
To: cypherpunks@toad.com
Subject: The Packwood Memorial Diary Server
Message-ID: <9401252317.AA02935@bilbo.suite.com>
MIME-Version: 1.0
Content-Type: text/plain
I often see threads debating whether the courts have the right to compel
you to reveal your encryption key. Some say yes, some say no.
Under the assumption that courts *do* have the right (or power) to force
you to reveal your key, the problem now becomes:
How can you prevent the government from proving you have encrypted
documents?
One Answer: Don't keep encrypted documents in your possession.
Somebody could create a Document Server to store encrypted documents.
Users would somehow get an anonymous Document Server account number when
they subscribe to the service. Users would use the remailer system to
send encrypted documents to the Document Server. The account numbers
would be used to organize the document database and for billing (the
tricky part).
Given a Document Server, the problem now becomes: How can you prevent the
government from proving you use a Document Server. This seems like a
strictly technical problem, unlike the "can they compel you to reveal your
key" problem.
Jim_Miller@suite.com
Return to January 1994
Return to “jim@bilbo.suite.com (Jim Miller)”