Devil's Advocate (again)

Adam Shostack adam at bwh.harvard.edu
Fri Jul 1 10:49:41 PDT 1994


DCF wrote:

| Additionally, since properly executed crypto can only be breached by the 
| application of torture to the key holder, The VIIIth Amendment's 
| prohibition of cruel and unusual punishment may apply.

There are a number of good ways to breach modern cryptography without
torture.  They include:

Van Eck (Tempest) monitoring.
Sodium pentathol & its more modern cousins.
Bribery.
Blackmail.


Adam

-- 
Adam Shostack 				       adam at bwh.harvard.edu

Politics.  From the greek "poly," meaning many, and ticks, a small,
annoying bloodsucker.







More information about the cypherpunks-legacy mailing list