home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky sci.crypt:5679 alt.society.civil-liberty:6900
- Path: sparky!uunet!pipex!warwick!uknet!edcastle!dcs.ed.ac.uk!pdc
- From: pdc@dcs.ed.ac.uk (Paul Crowley)
- Newsgroups: sci.crypt,alt.society.civil-liberty
- Subject: Re: Limits on the Use of Cryptography?
- Message-ID: <Bz9v4D.744@dcs.ed.ac.uk>
- Date: 14 Dec 92 23:12:13 GMT
- References: <2229.517.uupcb@grapevine.lrk.ar.us> <11283@baird.cs.strath.ac.uk> <1992Dec10.182022.9173@netcom.com> <Bz886x.Jw5@ddsw1.mcs.com>
- Sender: cnews@dcs.ed.ac.uk (UseNet News Admin)
- Reply-To: pdc@dcs.ed.ac.uk (Paul Crowley)
- Organization: Edinburgh University
- Lines: 15
-
- Quoting karl@ddsw1.mcs.com (Karl Denninger) in article <Bz886x.Jw5@ddsw1.mcs.com>:
- >In article <1992Dec10.182022.9173@netcom.com> strnlght@netcom.com (David Sternlight) writes:
- >>
- >>Iain McCord raises the possibiity that the police will "plant" an
- >>encrypted file, or worse, plant an incriminating encrypted file of
- >>their own design.
- >
- >... if the keys are not compromised you can, with certainty,
- >prove whether or not it was written by the individual in question.
-
- ...but if they're planting stuff on your very own hard disk, your keys
- probably are compromised.
- __ _____
- \/ o\ Paul Crowley pdc@dcs.ed.ac.uk \\ //
- /\__/ "I'm the boy without a soul." \X/
-