Ok - if I issue you your set of keys and then some one comes along and says - Hey I need to see that stuff or your out - I could just issue you new keys, and keep a set for my self and then every time they say - give me the data from X I use my copy to unlock the data and hand it over. It is conceptually simple. Execution is a bit more complex but I understand they have it working now and can indeed eavesdrop on everything. On Fri, Aug 20, 2010 at 7:22 AM, Stephen wrote: > " I don't see how the Saudi Arabia and India folks would be able to do > anything with the BES encryption channels, so long as the activation key > exchange doesn't occur OTA. " > > This is exactly their complaint, they cant do anything so in lieu of > that they are telling RIM to let them in or get banned from the > country. > --------------------------------------------------- > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > To subscribe, unsubscribe, or to change your mail settings: > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss