17 Dec
2003
17 Dec
'03
11:17 p.m.
DCF wrote: | Additionally, since properly executed crypto can only be breached by the | application of torture to the key holder, The VIIIth Amendment's | prohibition of cruel and unusual punishment may apply. There are a number of good ways to breach modern cryptography without torture. They include: Van Eck (Tempest) monitoring. Sodium pentathol & its more modern cousins. Bribery. Blackmail. Adam -- Adam Shostack adam@bwh.harvard.edu Politics. From the greek "poly," meaning many, and ticks, a small, annoying bloodsucker.