Destroying evidence (was "About 5yr. log retention")

Sean R. Lynch seanl at literati.org
Wed Dec 6 11:23:14 PST 2000


On Wed, Dec 06, 2000 at 07:19:13AM -0600, Jim Choate wrote:
[...]
> It's possession of the private keys that will roast your goose.

Fortunately the public key can be stored using steganography, or on some
medium that can be physically destroyed, or whatever.  Another option would
be to use an elliptic curve scheme that generates the private key on the
fly from a passphrase.  Fortunately they can't read your mind yet, though
keystroke readers could prove you knew the passphrase, but then again you
might claim that since the cops (and anyone else reading your keystrokes)
also knew the passphrase, that they had your private key as much as you
did.  And then there are ways to avoid having your keystrokes read.

-- 
Sean R. Lynch KG6CVV <seanl at literati.org>  http://www.literati.org/~seanl/
GPG/PGP signed/encrypted email preferred. Finger for public key.
Key fingerprint = 540F 19F2 C416 847F 4832  B346 9AF3 E455 6E73 B691





More information about the cypherpunks-legacy mailing list