From: Michael Motyka <mmotyka@lsil.com>
To: Tim May <tcmay@got.net>
Message Hash: 039c820daf78c92b2aca405a74617dc60f400e6e34949b82d8ad88cf5e564272
Message ID: <3602DE7E.1C0E@lsil.com>
Reply To: <v04011700b22791ad2d2d@[139.167.130.248]>
UTC Datetime: 1998-09-18 09:25:04 UTC
Raw Date: Fri, 18 Sep 1998 17:25:04 +0800
From: Michael Motyka <mmotyka@lsil.com>
Date: Fri, 18 Sep 1998 17:25:04 +0800
To: Tim May <tcmay@got.net>
Subject: Re: Questions for Magaziner?
In-Reply-To: <v04011700b22791ad2d2d@[139.167.130.248]>
Message-ID: <3602DE7E.1C0E@lsil.com>
MIME-Version: 1.0
Content-Type: text/plain
Tim May wrote:
> My view is that my writings are mine. They can try to get them with a
> search warrant or a court order, but they'd better not threaten me with
> imprisonment if I choose to write in some language they can't read. And
> that's all crypto really is, of course. Just another language.
>
My gut feeling is that if a search turns up an encrypted file then, by
golly, what you see is what there is, make a bit-accurate copy and be on
your way, what's in my head belongs to me. But is that what the courts,
scared shitless of hordes of child molesters and terrorists conspiring
via secure e-mail and phones, will say?
They'll probably avoid attacking the 1st and 4th( already weakened by
the war on drugs ) and attack the 5th with a 'greater good' argument and
the analogy of the locked safe. This requires an explanation of how the
stored documents are the modern-day .equivalent. of physical paper and
should be treated as such. It's only spitting distance from there to the
idea that a memorized key is the same as a physical key in which case
its owner doesn't enjoy the protections of the 5th. Hand it over Jack.
The law has to adapt to the changing technology. No need to outlaw
cryptography; just redefine the boundaries of the power to destroy.
Mike
PS - How does a grant of limited immunity work?
Return to September 1998
Return to ““William H. Geiger III” <whgiii@invweb.net>”