Destroying evidence (was "About 5yr. log retention")

Jim Choate ravage at einstein.ssz.com
Wed Dec 6 05:19:13 PST 2000



On Wed, 6 Dec 2000, Riad S. Wahby wrote:

> Unless you and the person with whom you are commmunicating publish
> your public keys on a key server before any of the government action
> in question takes place.

No, that won't work either. Simple publishing is no cover at all. Evidence
doesn't have to be secret to be evidence. Even public statements
(equivalent to publishing public keys) can be used against you.

If there is an exchange of encrypted data, that in and of itself is
sufficient to demonstrate communications. That is enough to demonstrate
intent and cooperation. Further, since the public keys are useless in and
of themselves for encryption without the private keys any exchange would
demonstrate that each party had access to the relevent private keys
mapped to the public keys.

It's possession of the private keys that will roast your goose.

    ____________________________________________________________________

           Before a larger group can see the virtue of an idea, a
           smaller group must first understand it.

                                           "Stranger Suns"
                                           George Zebrowski

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------






More information about the cypherpunks-legacy mailing list