It's cool but basically solves a problem that no longer exists. Once you've caused enough suspicion, they can simply dig up the records of all the data you've sent, both chaff and wheat, and serve you with an order to disclose your authentication key/lawfully hack you computer and obtain it without asking/apply some lead pipe cryptanalysis and get it anyway. In the end, it's no better than regular encryption, at the cost of being at least twice more inefficient.<p>Still, for all the crypto export nonsense, 1998 appears to have been a more innocent time:<p>> "But access to authentication keys is one thing that
government has long agreed that they don't want to have."