On 8/16/15 1:05 AM, Brian E Carpenter wrote:
I really believe this discussion completely misses the point.
RFC 1984 says:
Even if escrowed encryption schemes are used, there is nothing to
prevent someone from using another encryption scheme first.
Certainly, any serious malefactors would do this; the outer
encryption layer, which would use an escrowed scheme, would be used
to divert suspicion.
In other words: even the most Byzantine escrow system is useless in the
face of a bad actor who chooses to implement and use a non-escrowed
system, concealing its existence using a government-approved escrowed
system on top.
Or on bottom. Whichever. The point is well made in 1984.
Escrow is only useful against law-abiding people who
trust the government(s) in the first place.
It's that assertion that has been repeatedly proven false with all
manner of other technology.
Eliot
signature.asc
Description: OpenPGP digital signature