Destroying evidence (was "About 5yr. log retention")
Riad S. Wahby
rsw at mit.edu
Wed Dec 6 00:26:39 PST 2000
Jim Choate <ravage at EINSTEIN.ssz.com> wrote:
> This of course
> also breaks the standard 'encrypt using PGP' point as well. In that case
> the exchange of keys would demonstrate intent.
Unless you and the person with whom you are commmunicating publish
your public keys on a key server before any of the government action
in question takes place.
In that case, you wouldn't have to send your key to that person---they
can access it via the keyserver. As to getting their key, it wouldn't
be hard to have that person post a signed message to a public list to
which you are subscribed, giving you demonstrable reason to download
his/her public key.
--
Riad Wahby
rsw at mit.edu
MIT VI-2/A 2002
5105
More information about the cypherpunks-legacy
mailing list