11 April 2011

\Cryptography is typically bypassed, not
penetrated."
| Adi Shamir [1]

\Just because encryption is involved, that
doesn't give you a talisman against a pros-
ecutor. They can compel a service provider
to cooperate."
| Phil Zimmerman [2]