home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!mcsun!sun4nl!ruuinf!piet
- From: piet@cs.ruu.nl (Piet van Oostrum)
- Subject: Re: Limits on the Use of Cryptography?
- Sender: network-news@cs.ruu.nl
- Message-ID: <1992Nov11.095811.27796@cs.ruu.nl>
- In-Reply-To: ritter@cactus.org (Terry Ritter)
- Date: Wed, 11 Nov 1992 09:58:11 GMT
- Reply-To: piet@cs.ruu.nl (Piet van Oostrum)
- References: <1992Nov11.061210.9933@cactus.org>
- Organization: Dept of Computer Science, Utrecht University, The Netherlands
- Lines: 15
-
- >>>>> ritter@cactus.org (Terry Ritter) (TR) writes:
-
- TR> The police bust an alleged child molester, and take possession
- TR> of his PC. They believe that the hard drive contains a full
- TR> database of young kids who have been *or may be* assaulted.
- TR> That database is enciphered.
-
- Yeah and would you think he would just encipher it with a registered key?
-
- Or think of the following scenario: Het isn't so stupid to put the database
- in his computer, but he has it on paper in a vault with a combination lock.
- What is the difference? (by the way, the vault destroys its contents when
- it is forcefully opened).
- --
- Piet van Oostrum <piet@cs.ruu.nl>
-