Speaking on Deep Background, the Press Secretary whispered:
On 29-apr-04, at 7:02, Stephen Sprunk wrote:
The feds clearly have the power to get through or around encryption
I have a hard time believing this...
So what do they do? Send a team in to retrieve the key from your system? Borrow some CPU time from the NSA?
In the Scarfo case (a small-time Tony Soprano type) they did multiple black-bag entries to put a keysnatcher on his laptop. <http://www.epic.org/crypto/scarfo.html> -- A host is a host from coast to coast.................wb8foz@nrk.com & no one will talk to a host that's close........[v].(301) 56-LINUX Unless the host (that isn't close).........................pob 1433 is busy, hung or dead....................................20915-1433