[13416] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: "PGP Encryption Proves Powerful"

daemon@ATHENA.MIT.EDU (John Kelsey)
Tue Jun 3 14:45:44 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 03 Jun 2003 11:25:16 -0400
To: iang@systemics.com
From: John Kelsey <kelsey.j@ix.netcom.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <3EDA192D.40B69B1C@systemics.com>

At 11:18 AM 6/1/03 -0400, Ian Grigg wrote:
...
>This sounds workable in theory, but in practice,
>one has to work with the skills base of the users
>and the stress of the work.
>
>Terrorists are generally not adept at technical
>work.  They are not really chosen for their
>skills;  more their loyalty, their anger, and
>often their simplistic belief in "some other
>bad guy" stories.  Terrorists are like soldiers,
>mostly drawn from the lower echelons of society,
>with a small smattering of bright sparks who
>rise to the top (if they survive at all).  If
>they could master technically challenging tools
>like crypto then they'd not be terrorists, they'd
>be out there making a living.

Yeah, I suspect you're right.  And the big problem with these threshhold 
schemes is that non-cryptographers end up unable to figure out what the 
heck is going on with them.  Once you get past 2/n schemes, most peoples' 
eyes glaze over.
...

>iang

--John Kelsey, kelsey.j@ix.netcom.com
PGP: FA48 3237 9AD5 30AC EEDD  BBC8 2A80 6948 4CAA F259



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post