Why create offline main key without encryption capabilities

Mark H. Wood mwood at IUPUI.Edu
Tue Jun 3 16:22:25 CEST 2014


On Mon, Jun 02, 2014 at 11:40:25AM -0700, Robert J. Hansen wrote:
> > Am also not familiar with any legal tests or precedents,
> > but the following could hypothetically just as easily be argued:
> 
> The government wants you to do X; you're apparently not complying;  
> you're now before the judge who has to decide whether the government  
> has the power to make you do X.  The judge doesn't care about the  
> third way you're proposing: the judge is only concerned with whether  
> the government has the legal power to make you do X.  That's it.   
> Nothing else.
> 
> If you want to negotiate with the government then you can do that  
> outside the courtroom.  Within it, all you are allowed to do is argue  
> your case ("the government does not have the authority to make me do  
> X").

So, anyone who wants to offer to recover session keys rather than hand
over more-general keys should work on that *now*, when you can perhaps
get it into the law and common practice, rather than later, when you
cannot get it into court.  Right now might be a good time to be heard
on questions of narrowing the scope of search w.r.t. electronic
communication.

-- 
Mark H. Wood, Lead System Programmer   mwood at IUPUI.Edu
Machines should not be friendly.  Machines should be obedient.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: Digital signature
URL: </pipermail/attachments/20140603/64494ffd/attachment.sig>


More information about the Gnupg-users mailing list