Two convicted in U.K. for refusal to decrypt data
hrickards at l33tmyst.com
Fri Aug 14 17:09:35 CEST 2009
-----BEGIN PGP SIGNED MESSAGE-----
Brian Mearns wrote:
> On Wed, Aug 12, 2009 at 10:46 PM, Joseph Oreste Bruni<jbruni at me.com> wrote:
>> Not entirely on topic, but for those using GnuPG (or other encryption
>> software), you should always keep abreast of the encryption laws of your
> Has everyone seen the "Vanish" project from University of Washington?
> If you haven't you should really give their paper a read, it's pretty
> interesting. The basic idea is that the key is random, and no-one
> actually needs to "know" it: it's broken up using secret sharing and
> dsitributed through a peer-to-peer network. The recipient can retrieve
> the shares and reconstruct the key for a one-time decryption, but over
> time, the shares should naturally leave the network and eventually the
> key is lost completely.
> I have my doubts, but I'm open to the possibility that it could work,
> and I'm very interested to see how law-enforcement will respond if it
> does. Will they force all p2p nodes to log everything, try to monitor
> networks themselves, or just plain make the system illegal?
If I remember correctly, wasn't something like this on Slashdot recently
(or was it Vanish)?
Harry Rickards <hrickards at l33tmyst.com>
GPG Key Info:
pub 1024R/58449F6F 2009-06-12
uid Harry Rickards (OpenPGP Card) <hrickards at l33tmyst.com>
sub 1024R/D775CCEE 2009-06-12
sub 1024R/9394048C 2009-06-12
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
More information about the Gnupg-users