On 14/08/2015 21:41, Brian E Carpenter wrote:
Of course, or they have made mistakes that weaken the strong crypto. But if your job is to look for the really bad guys, you MUST assume that they are using strong crypto with inaccessible keys. It's irresponsible to assume anything else. Brian
Brian Let's not boil the ocean here. Many criminals use COTS solutions. Disabling their technology in a way that is still provides satisfactory for privacy for ordinary citizens would be a useful engineering goal that pragmatically addresses both their need for privacy and the need for law enforcement. I understand that the really bad people will put in place systems that are harder to decrypt, but let's try to move that to the realm of bespoke systems where there is a chance that they will make mistakes. - Stewart