Why create offline main key without encryption capabilities
Mark H. Wood
mwood at IUPUI.Edu
Tue Jun 3 16:22:25 CEST 2014
On Mon, Jun 02, 2014 at 11:40:25AM -0700, Robert J. Hansen wrote:
> > Am also not familiar with any legal tests or precedents,
> > but the following could hypothetically just as easily be argued:
>
> The government wants you to do X; you're apparently not complying;
> you're now before the judge who has to decide whether the government
> has the power to make you do X. The judge doesn't care about the
> third way you're proposing: the judge is only concerned with whether
> the government has the legal power to make you do X. That's it.
> Nothing else.
>
> If you want to negotiate with the government then you can do that
> outside the courtroom. Within it, all you are allowed to do is argue
> your case ("the government does not have the authority to make me do
> X").
So, anyone who wants to offer to recover session keys rather than hand
over more-general keys should work on that *now*, when you can perhaps
get it into the law and common practice, rather than later, when you
cannot get it into court. Right now might be a good time to be heard
on questions of narrowing the scope of search w.r.t. electronic
communication.
--
Mark H. Wood, Lead System Programmer mwood at IUPUI.Edu
Machines should not be friendly. Machines should be obedient.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: Digital signature
URL: </pipermail/attachments/20140603/64494ffd/attachment.sig>
More information about the Gnupg-users
mailing list