[959] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: encryption by the wind in an open field

daemon@ATHENA.MIT.EDU (Mark D. Fisher)
Fri Jun 6 17:15:18 1997

From: "Mark D. Fisher" <mfisher@us.oracle.com>
To: trei@process.com
Date: Fri, 6 Jun 1997 13:30:05 -0700 ()
Cc: unicorn@schloss.li, cryptography@c2.net, cme@cybercash.com, trei@c2.net
In-Reply-To: <199706061946.MAA26100@blacklodge.c2.net> from "Peter Trei" at Jun 6, 97 03:54:56 pm

> 
> A year or so ago, perhaps on the cypherpunk list, there was a post
> citing a legal precedent. In it a judge opined that in the case
> of a locked safe, a suspect could be coerced into handing over a
> physical key, but that forcing him/her to reveal a combination (which
> existed only in his/her memory) would violate their right against 
> self-incrimination.
> 

I suspect that this would not be useful in a real life case.  It is unlikely 
that the suspect has memorized a 128 byte key.  He would likely have it on
diskette or at least on paper.  If so he could be coerced into handing it 
over.  I think the destruction of the paper or diskette could be prosecuted 
as destruction of evidence.  On the other hand I'm not a lawyer.

-Mark

=       The statements and opinions expressed here are my own and           =
=       do not necessarily represent those of Oracle Corporation.           =


home help back first fref pref prev next nref lref last post