Destroying evidence (was "About 5yr. log retention")

Riad S. Wahby rsw at mit.edu
Wed Dec 6 00:26:39 PST 2000


Jim Choate <ravage at EINSTEIN.ssz.com> wrote:
> This of course
> also breaks the standard 'encrypt using PGP' point as well. In that case
> the exchange of keys would demonstrate intent.

Unless you and the person with whom you are commmunicating publish
your public keys on a key server before any of the government action
in question takes place.

In that case, you wouldn't have to send your key to that person---they
can access it via the keyserver.  As to getting their key, it wouldn't
be hard to have that person post a signed message to a public list to
which you are subscribed, giving you demonstrable reason to download
his/her public key.

--
Riad Wahby
rsw at mit.edu
MIT VI-2/A 2002

5105





More information about the cypherpunks-legacy mailing list