From: Adam Shostack <adam@bwh.harvard.edu>
To: frissell@panix.com (Duncan Frissell)
Message Hash: d664bc27af1665ababaff2e4f99b036b39f6cbc19925620a88eba0c331908023
Message ID: <199407011746.NAA13073@duke.bwh.harvard.edu>
Reply To: <Pine.3.87.9407011344.A15239-0100000@panix.com>
UTC Datetime: 1994-07-01 17:49:41 UTC
Raw Date: Fri, 1 Jul 94 10:49:41 PDT
From: Adam Shostack <adam@bwh.harvard.edu>
Date: Fri, 1 Jul 94 10:49:41 PDT
To: frissell@panix.com (Duncan Frissell)
Subject: Re: Devil's Advocate (again)
In-Reply-To: <Pine.3.87.9407011344.A15239-0100000@panix.com>
Message-ID: <199407011746.NAA13073@duke.bwh.harvard.edu>
MIME-Version: 1.0
Content-Type: text/plain
DCF wrote:
| Additionally, since properly executed crypto can only be breached by the
| application of torture to the key holder, The VIIIth Amendment's
| prohibition of cruel and unusual punishment may apply.
There are a number of good ways to breach modern cryptography without
torture. They include:
Van Eck (Tempest) monitoring.
Sodium pentathol & its more modern cousins.
Bribery.
Blackmail.
Adam
--
Adam Shostack adam@bwh.harvard.edu
Politics. From the greek "poly," meaning many, and ticks, a small,
annoying bloodsucker.
Return to July 1994
Return to “tcmay@netcom.com (Timothy C. May)”