Re: Forensics on PDAs, notes from the field
On Fri, 13 Aug 2004, Thomas Shaddack wrote:
In the world of industrial espionage and divorce lawyers, the FedZ aren't the only threat model.
At 03:06 PM 8/13/04 -0400, Sunder wrote:
Right, in which case GPG (or any other decent crypto system) is just fine, or you wouldn't be looking for stego'ing it inside of binaries in the first place.
I don't think Sunder grasps how much fun divorce lawyers can be. So, Mr. Smith, what *do* you hide with your crypto tools? And why won't you let the court examine the plaintext in camera, if your content is so benign? (Or are your ex-wife's accusations true?) Also, public schools prohibit the use of encryption. No kidding. And finding a crypto tool on a .mil slave's personal machine may be indicting evidence, given their lack of civilian legal processes, when accused by their own. Since mere possession of lockpick tools is criminal, do you really think you can possess crypto tools freely?
participants (1)
-
Major Variola (ret)