And if evidence is compromised by encryption why is HMG so keen to crack encryption via the IP Act?
As Michael suggests - the technology is there, the process is not hard. All you need to do is apply the same rigour and quality control as you would for the simpler issue of scanning. BIP 1008 etc.
Indeed as a matter of logic, ALL electronic records are in fact "encrypted" - typically using a simple binary / ASCII substitution key. What we normally refer to as encryption just uses a stronger algorithm.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at https://www.jiscmail.ac.uk/help/subscribers/subscribercommands.html
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|