cryptographically signed but unencrypted, and the PKI is run by the state. would be perfect for TLAs: no hassle to intercept and attributable to a real-life existence.
cryptographically signed but unencrypted, and the PKI is run by the state. would be perfect for TLAs: no hassle to intercept and attributable to a real-life existence.