No, it's the lack of a credible threat of such a system being put in place. Once the system is in place it is too late to impliment crypto to recover. There are other similar cause-effect logic errors in your arguments as well. On Sat, 22 Sep 2001, Ryan Lackey wrote:
The greatest enemy of secure electronic mail, for instance, being widely deployed is the LACK of widespread monitoring. If every internet connection in the US were monitored actively, and the contents were routinely used in civil and criminal legal actions, technologies like ZKS Freedom, PGP, SSL would be in far wider use than they are now.
-- ____________________________________________________________________ Kill them all, take their land, and go there for vacation. Rage Against The Machine The Armadillo Group ,::////;::-. James Choate Austin, Tx /:'///// ``::>/|/ ravage@ssz.com www.ssz.com .', |||| `/( e\ 512-451-7087 -====~~mm-'`-```-mm --'- -------------------------------------------------------------------- --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com