Home / Blogs

Schneier and Kerr on Encryption Workarounds

Bruce Schneier is a famous cryptography expert and Orin Kerr a famous cyberlaw professor. Together they’ve published a law journal article on Encryption Workarounds. It’s intended for lawyers so it’s quite accessible to non-technical readers.

The article starts with a summary of how encryption works, and then goes through six workarounds to get the text of an encrypted message:

  • Find the key: for example, you might find a piece of paper on which the user has written the key.
  • Guess the key: for example, the user’s birth date or “password.”
  • Compel the key: make the user reveal the key, or force the user to use a biometric like a thumbprint.
  • Exploit a flaw: crypto software has bugs, and some have deliberate back doors.
  • Access the plaintext when the device in use: Silk Road drug market operator Ross Ulbricht used full disk encryption, so agents at a café staged a distraction, grabbed his open laptop, and searched it on the spot while arresting him.
  • Locate a plaintext copy: cloud backups are a good place to start.

It then draws some lessons, starting with the obvious one that no workaround works all the time but they all work some of the time, and then considers the often ambiguous legal status of workarounds.

It’s well worth reading for anyone interested in the contentious intersection of law and cryptography.

By John Levine, Author, Consultant & Speaker

Filed Under


correctd URL ruddyconsult  –  May 23, 2018 6:50 AM

The posted link did not work for me, so I found this better


looks like a copy and paste error Phil Howard  –  May 23, 2018 7:12 AM

looks like a copy and paste error ... the last digit was cut off. it's always good to check your links at edit time.

Correction made Ali Farshchian  –  May 23, 2018 2:32 PM

Thank you for your feedback on the incorrect link.

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Co-designer of the TCP/IP Protocols & the Architecture of the Internet



New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API


Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign


Sponsored byDNIB.com

Brand Protection

Sponsored byCSC