KEY ESCROW PROCEDURES

Mike Godwin mnemonic at eff.org
Sat Sep 18 11:55:31 PDT 1993


 
Carl writes:
 
> Meanwhile, where is the proof that the key being requested corresponds to
> a person on whom a wiretap has been ordered?

The authorized key request will normally occur after law-enforcement
officials have snagged the chip serial number from the LEAF
(law-enforcement field) of the signal they captured with an authorized
wiretap.


--Mike








More information about the cypherpunks-legacy mailing list