Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: cynwoody
All part of the implementation :)

Key management, tokens for authentication, hardening systems and auditing hardware and software regularly, etc.

There was that mob boss that was using encryption out on the east coast. Got busted when the FBI did a black bag job on his home PC, pursuant to a wiretap warrant and got his passphrase.

The problem for the perp in that scenario is that when they get the passphrase for the key, all the traffic sent using that key is compromised. It costs next to nothing to store a bunch of encrypted traffic forever if required, hoping that a key turns up in the future.
40 posted on 05/04/2003 8:40:37 PM PDT by cryptical
[ Post Reply | Private Reply | To 36 | View Replies ]


To: cryptical
"Key management," in this case, is McGreevey!

This article is not about technology - it's about people.

This is why they're known as 'rats!

41 posted on 05/05/2003 3:45:04 AM PDT by Ed_in_NJ
[ Post Reply | Private Reply | To 40 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson