Ok - if I issue you your set of keys and then some one comes along and
says - Hey I need to see that stuff or your out - I could just issue
you new keys, and keep a set for my self and then every time they say
- give me the data from X I use my copy to unlock the data and hand it
over. It is conceptually simple. Execution is a bit more complex but I
understand they have it working now and can indeed eavesdrop on
everything.
On Fri, Aug 20, 2010 at 7:22 AM, Stephen <
cryptworks@gmail.com> wrote:
> " I don't see how the Saudi Arabia and India folks would be able to do
> anything with the BES encryption channels, so long as the activation key
> exchange doesn't occur OTA. "
>
> This is exactly their complaint, they cant do anything so in lieu of
> that they are telling RIM to let them in or get banned from the
> country.
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss