\Cryptography is typically bypassed, not
penetrated."
| Adi Shamir [1]
\Just because encryption is involved, that
doesn't give you a talisman against a pros-
ecutor. They can compel a service provider
to cooperate."
| Phil Zimmerman [2]
Opinions, observations, diary of an Irvine, California engineer.