Reply to post: Re: So...

'Snowden risked lives' fearfest story prompts sceptical sneers

tom dial Silver badge

Re: So...

With decently implemented encryption systems and reasonable key sizes, the efficient way to access specific encrypted material is to obtain the key from someone who has it and apply it. Back doors, escrowed keys, and encryption system or protocol attacks are for other use cases.

For law enforcement purposes, search warrants, subpoenas, and contempt of court punishments ought to be enough, or more than enough, for nearly all cases.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2019