North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Buying and selling root certificates

  • From: David Lesher
  • Date: Thu Apr 29 10:20:39 2004

Speaking on Deep Background, the Press Secretary whispered:
> 
> 
> On 29-apr-04, at 7:02, Stephen Sprunk wrote:
> 
> > The feds clearly have the power to get through or around encryption
> 
> I have a hard time believing this...
> 
> So what do they do? Send a team in to retrieve the key from your 
> system? Borrow some CPU time from the NSA?

In the Scarfo case (a small-time Tony Soprano type) they did
multiple black-bag entries to put a keysnatcher on his laptop.

<http://www.epic.org/crypto/scarfo.html>



-- 
A host is a host from coast to [email protected]
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433