Devil's Advocate (again)
Adam Shostack
adam at bwh.harvard.edu
Fri Jul 1 10:49:41 PDT 1994
DCF wrote:
| Additionally, since properly executed crypto can only be breached by the
| application of torture to the key holder, The VIIIth Amendment's
| prohibition of cruel and unusual punishment may apply.
There are a number of good ways to breach modern cryptography without
torture. They include:
Van Eck (Tempest) monitoring.
Sodium pentathol & its more modern cousins.
Bribery.
Blackmail.
Adam
--
Adam Shostack adam at bwh.harvard.edu
Politics. From the greek "poly," meaning many, and ticks, a small,
annoying bloodsucker.
More information about the cypherpunks-legacy
mailing list