Sounds like an excuse for a no knock SWAT raid potentially
As if they need another.
Sounds like an excuse for a no knock SWAT raid potentially
You probably did. Judges have done that, twice. Then the Eleventh Circuit Court of Appeals slapped them down and said 'no, that's un-Constitutional, you can't force people to do that.'
Lets step back a few decades. Can I be compelled to divulge a combination to a vault? Or is this apples/oranges in the courts eyes? HM? Kirk?
I saw a quote from somebody from an alphabet soup agency (FBI I think) saying that the move by Apple will "protect pedophiles."
Jeeze, if they have a problem with a pedophile, take it up with him and leave my stuff alone.
They just need to look at some stuff on hard drive to make sure you aren't a pedophile.
Trust but verify.
No problem. Where is the warrant?
Correction. Phil Zimmerman did not export his PGP source code in a book. Phil Zimmerman took PGP on a set of floppies and drove up the California coast, hitting as many BBSes as he could along the way, uploading it to those systems. He included header information in his posts for cross-posting to Usenet newsfeeds. Usenet newsfeeds include header information to restrict distribution of individual messages. Zimmerman was careful to include distribution information to restrict his PGP source code to distribute only within the United States of America. All was well for these BBS uploads until one of the postings made its way to a Usenet news server in St. Louis, MO, a news server run by the federal government. This government news server was misconfigured to ignore the distribution header. This misconfigured federal government news server bounced the PGP source code abroad, and from there, it went 100% global.
The federal government tried to try Zimmerman for violating the export in munitions statutes, but the evidence was overwhelming that it was the federal government itself, and nothing that Zimmerman did, that let that genie out of the CONUS bottle. They didn't have a legal leg to stand on and after putting him through Hell for over a year, they were forced to drop all charges.
They futilely tried to have him relinquish the master key for the database and he flipped them the middle finger and shut it down. This may be a technical win for government and its censorship, but no data was compromised. Additionally, the service didn't do anything more than PGP/GPG does now for email service.
I have to say I'm still a little suspicious of PGP ever since the .gov backed off of Zimmerman. The whole "oh, now we don't have a leg to stand on. You're free to go." thing just feels contrived. The expression I heard years ago is that it's "too pat".
Admittedly, my skepticism is rooted in a lack of knowledge; I don't know C++ or Python or whatever PGP was written in, so even if I saw the source code, I'd not be able to interpret it, and in the absence of personal verifiability, a healthy skepticism is not a bad thing. It just would not surprise me if there was, in fact, a vulnerability that only a Cray could make use of or some such.
And yes, I'm fully aware that my tinfoil is fitting tightly. That's the best way to keep the alien mind control rays out.
Blessings,
Bill
I have to say I'm still a little suspicious of PGP ever since the .gov backed off of Zimmerman. The whole "oh, now we don't have a leg to stand on. You're free to go." thing just feels contrived. The expression I heard years ago is that it's "too pat".
Admittedly, my skepticism is rooted in a lack of knowledge; I don't know C++ or Python or whatever PGP was written in, so even if I saw the source code, I'd not be able to interpret it, and in the absence of personal verifiability, a healthy skepticism is not a bad thing. It just would not surprise me if there was, in fact, a vulnerability that only a Cray could make use of or some such.
And yes, I'm fully aware that my tinfoil is fitting tightly. That's the best way to keep the alien mind control rays out.
Blessings,
Bill
It is pgp pretty good privacy
It's not the best privacy in the world.
Encryption like that is used for time sensitive data. As by the time someone cracks it its irrelevant.
It would be best if everyone was doing it for everything. Then they would really have to focus on what they want to break.
The idea that software was 1st Amendment fodder came from a college professor of cryptology who wanted to teach a distance learning class in it and was getting flak from the ITAR folks who claimed that crypto software was munitions in all forms, whether source code or machine code. He sued saying the source code he wanted to send to his students, some of whom were outside of the U.S.A., was more akin to a published book/written work than they were to an operable mechanism/weapon. He sued and won, and ever since, source code has been free to send and receive in America, regardless of wherefrom or whereto.