On Wed, Dec 06, 2000 at 07:19:13AM -0600, Jim Choate wrote: [...]
It's possession of the private keys that will roast your goose.
Fortunately the public key can be stored using steganography, or on some medium that can be physically destroyed, or whatever. Another option would be to use an elliptic curve scheme that generates the private key on the fly from a passphrase. Fortunately they can't read your mind yet, though keystroke readers could prove you knew the passphrase, but then again you might claim that since the cops (and anyone else reading your keystrokes) also knew the passphrase, that they had your private key as much as you did. And then there are ways to avoid having your keystrokes read. -- Sean R. Lynch KG6CVV <seanl@literati.org> http://www.literati.org/~seanl/ GPG/PGP signed/encrypted email preferred. Finger for public key. Key fingerprint = 540F 19F2 C416 847F 4832 B346 9AF3 E455 6E73 B691