Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Encryption and risk



Dan Ritter wrote:
> Everyone seems to be ignoring the real brute force attack:
> rubber-hose cryptanalysis.
> 
> If Eve and Mallory are well-funded and either have a state or a
> significant criminal group backing them, it might not matter
> that the algorithm is good, the key is hard and the
> implementation perfect. Torture and imprisonment, and sometimes
> the threats thereof, work all too well at obtaining immediately
> verifiable secrets.

In this case, OTP could actually be worse, because you need to have
ready access to the list of codes.  And if you do, chances are they will
too after sufficient persuasion.






BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org