Destroying evidence (was "About 5yr. log retention")

Jim Choate ravage at einstein.ssz.com
Wed Dec 6 17:46:16 PST 2000



On Wed, 6 Dec 2000, Sean R. Lynch wrote:

> On Wed, Dec 06, 2000 at 07:19:13AM -0600, Jim Choate wrote:
> [...]
> > It's possession of the private keys that will roast your goose.
> 
> Fortunately the public key can be stored using steganography, or on some
> medium that can be physically destroyed, or whatever.

That sort of destroys the 'public' part of that doesn't it? This takes us
into the "if you've got a channel to send the code on how to decode the
public key, why not send the public key privately? And if the channel is
safe enough to send the key privately why not send the message itself?

There is also the point that if there is a public key and you claim it
valid then by assumption you're also claiming there is a private key.

    ____________________________________________________________________

           Before a larger group can see the virtue of an idea, a
           smaller group must first understand it.

                                           "Stranger Suns"
                                           George Zebrowski

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------






More information about the cypherpunks-legacy mailing list