
17 Dec
2003
17 Dec
'03
6:17 p.m.
Adam Back writes:
You have a dual concern: you are trying to protect against big brother and against little brother.
At the technical level, is there a meaningful difference between the brothers? Aren't we really talking about third-party access to communications, and second-party access to stored data ... with the "brother" distinction being one made at a social/political level, as a judgement about the legitimacy of the access or the size of the actor, rather than the character of the access? -- Greg Broiles | US crypto export control policy in a nutshell: gbroiles@netbox.com | Export jobs, not crypto. http://www.io.com/~gbroiles | http://www.parrhesia.com