1. 7
  1.  

  2. 2

    I get the feeling that in the future, we won’t have to worry about computational attack vectors, but instead seek protection from social engineering attacks. Why try and factor a large number when you can threaten the kid who has the keys?

    1. 1

      I think that’s true for non-state actors, but in this case we’re specifically dealing with a request from the state to bake-in a method to all communication mechanisms by which they don’t have to do that, or where the key holder is dead.

    2. 2

      Is it possible without reducing security, obviously not. You have a universal key, some foreign spy, or terrorist steals it and badaboom they own the world. I don’t see why this is even a conversation we’re having?

      1. 1

        Because the policymakers remain ignorant of that, wittingly or unwittingly. Walking someone without the needed background through the technical options and laying out the reason why it’s not possible is valuable and, I think, needed.