From: Jim Bell Area: Public Key Encryption To: All 23 Nov 94 00:02:00 Subject: Clipper "Bad Boys" UpdReq I periodically re-post this message to ensure that the companies responsible for Clipper are identified. If anybody is aware of other companies also responsible, I would appreciate hearing about it. Area: 5 Msg#: 1 Date: 30 Apr 93 15:47:55 From: Jim Bell To: All Subj: Encryption:More Bad Guys I've identified yet another "bad boy" in the proposed standard voice- encryption system, VLSI Technology. The company that makes the chips (silicon foundry): VLSI Technology, 1109 MacKay Drive, San Jose CA 99131 phone 408-434-3000; fax 408-434-7926 District Manager: John Levers The name of the company that did the design of the crypto-chip is: Mykotronx, 357 Van Ness Way, Torrance, CA 90501, phone 310-533-8100, fax 310-533-0527. This is a chip-design place. They use someone else's chip manufacturing capability (a "foundry"). One of their customers-to-be is AT+T. [JB added note 11/22/94: I would be interested in finding out if Mykotronx is just a front-organization for the NSA.] AT&T AT&T Secure Communications Systems is headquartered in Greensboro. For more information about the AT&T Telephone Security Device 3600 and other AT&T Secure Communications Products, call David Arneke at 919-279-7680. CONTACT: David Arneke of AT&T Secure Communications Systems, 919-279- 7680,or after hours, 919-273-5687, or Herb Linnen of AT&T Media Relations, 202-457-3933, or after hours, 202-333-9162 ------------------------------------------- To recap: On April 16, 1993, the White House announced a proposed standard encryption system for voice telephones, and possibly for data transfer also. All the keys for such systems would be given to the government, split into two 40-bit sub-keys. It will do this do give the illusion that the codes are safe and cannot be misused, but in reality the security of this system depends totally on your view the trustworthiness of government. In other words, believing that this system is secure is up there with belief in Santa Claus and the Tooth Fairy. The telephones manufactured under this system will be sold under fraud: The average customer will not be told that the codes for the system are shared with the government. He will not be told, certainly by the manufacturer, that the system is therefore defective. The government has tried to portray this as if it would be a voluntary system. But it cannot control technology manufactured in the rest of the world. If it's truly voluntary, there would be a bigger demand for encrypted telephones whose codes were not shared by government. They would be available to you and others, cheaply. Nobody seriously contemplating a crime would depend on faulty encryption, so they would buy the truly secure phones. This would make the "voluntary" standard almost totally useless. In a few years, the government will pretend to "discover" this weakness, and will act to make truly secure telephones illegal. At the time, they will claim that only criminals will want telephones secure even from the government. Here's what you can do to stop this: Call these organizations to complain, loudly and often. These people don't expect that their actions will "come back to haunt them." It would only take a few phone calls to "wake them up" to the problem they've caused. Write letters-to-the-editor to newspapers in their area. Raise ethical questions about the activities of these companies. ... Just say no to Clipper/Capstone/NSA ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: Alan Pugh Area: Public Key Encryption To: Basil Hoyl 22 Nov 94 01:58:52 Subject: Lawyer 2/4 UpdReq -----BEGIN PGP SIGNED MESSAGE----- BH> topics I listed. Why did I choose the form I chose to list BH> these things? First and foremost, I wanted to include "key BH> words" so that if someone had a particular interest and they BH> typed in a key word, my key would appear as an option. jc> Hmmm, I wonder if a keyword list would have attracted less attention? jc> IE, "Keywords: Lawyer law legal texas insurance" etc. i'll second this. i doubt many would bitch about such a format. i'd go even further to say that such a format would be useful even if it didn't have commercial purposes. suppose my key looked like this... (it doesn't) Alan Pugh <0003791548@mcimail.com> Interests: Fractals, Crypto, Quantum Theory, Constitution I would then be easily locatable by others with similar interests. This would be a bit more useful than strictly an e-mail address. You asked about possible limitations on the size of public keys. While this might be desirable. (debatable imo) one problem with this is that signatures add to the size of the key, but are desirable. (within limits) i don't see the point of having 20 sigs, but even 4 or 5 will swell your key significantly, though i think they might be processed differently than if you have just one big key. BH> change with time and circumstances. I agree that my public BH> key may be offensive or annoying to individuals at this BH> time. If others follow my suggestion that public keys BH> contain in the ID field more information than bare name and BH> address, but BH> actually identify the complete person whose key it is, then BH> while some will always consider it to be bad taste, it might BH> become acceptable to the community at large. Does this make BH> me a pioneer in the field of poor taste? ;) as a lawyer you ought to be used to this. while i disapproved of your initial key, you've brought up some valuable points for discussion. amp <0003701548@mcimail.com> November 22, 1994 1:57 -----BEGIN PGP SIGNATURE----- Version: 2.61 iQEVAwUBLtFsSCgP1O9KJoPBAQELtQf/TRCTkSNClNA7HrrAG7TCIx9OsOycN9Fv U6tvc1RFhIJpOIq3zf17r51zjlYGaQfIJlfR5kZE0lmamRDPruoBFhRsGTAC10aX swSgl0uXfa2l4Kt7Je1TTllo7mS/6Wmqr1Lo4CYMOjklTwhC/iiDA27/2IfDp/u6 kYykerHvGcNJbKhVBD5qk+c8e0Vf2BbO3HkaLBHIF6b/ZYox5Web+TldxFTW1QmU FQ4y8zc9xSIi3PIdYlO309B+1hCPZQSgVw0IuIRkcT1zSvCuovsxUPnWcfdFRgkR hA7HYjuip0RPM1POKr93KrC/Pg52bd/Ynnag8vpGXba2nNgwtAVKjw== =/hOe -----END PGP SIGNATURE----- ~~~ PGPBLUE 2.5 ... Klinton virus found. Exterminate? (Y/N) 201434369420143436942014343694201434369420143436942014343694718 From: Alan Pugh Area: Public Key Encryption To: All 22 Nov 94 22:50:58 Subject: cypherpunks UpdReq does anyone know how to get on the cypherpunks mailing list? amp <0003701548@mcimail.com> November 22, 1994 22:50 ... Courts are where justice is dispensed with. -s. clemens 201434369420143436942014343694201434369420143436942014343694718 From: Rich Veraa Area: Public Key Encryption To: Ian Lin 22 Nov 94 18:00:30 Subject: PGP versions UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message to Michael Bauser, Ian Lin wrote: MB> YOU ARE BEING PARANOID. STOP THAT. I HATE PARANOIA. IL> I LIKE IT. Paranoia is good for the soul. Paranoia keeps you IL> alive. Non- paranoid people are fools. They are not cautious IL> and are easily fooled. Paranoia is _not_ "being careful." It's a pathological _irrational_ unreasonable fear. Paranoia is debilitating at best and violently destructive at worst. Cheers, Rich -----BEGIN PGP SIGNATURE----- Version: 2.6.1 Comment: rveraa@newssun.med.miami.edu iQCVAwUBLtJPjp80iJ+tnwVVAQENbQP/b8OiWlYhpDpKfBoW0IyukrmFfrsx5NaX zD/Nw3jhtiTtvsIUquayNfCz0Jcmf2aEj3YORsWCCHSW0AxxwPgMbuRQOVSNnBGI waF2ukK8Z8iz4gYld6/VlWWYnWyWX6SuOk5/LCSuD0/pTDSFsZap12sv4eayg7Z0 vdXWQIHb1RU= =KrwD -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Wes Landaker Area: Public Key Encryption To: Ian Lin 22 Nov 94 15:31:20 Subject: legal PGP UpdReq -----BEGIN PGP SIGNED MESSAGE----- Hello Ian! 17 Nov 94 17:47, Ian Lin wrote to Wes Landaker: WL> Do you have any reason, besides just that "a lot" of others WL> are using PGP 2.3a, IL> This one is more than good enough. Then stick with it. =) And you can keep on using PKZip 1.10 and DOS 3.3 as well, if you really feel that they are more than good enough as well, eh? :) wjl [Team OS/2] * 1:202/322@fidonet.org * wjl@dstorm.jd.com * * UUCP: nosc!jadpc!dstorm!wjl * PGP Key: C0E9A805 * FREQ: PGPKEY * -----BEGIN PGP SIGNATURE----- Version: 2.61 iQCVAwUBLtJ/kgUBVGzA6agFAQFcAQQApxUwTVI0RrXWLinREPhzfD8e70FeBJ0l 8CWFu2ulH1/p6QJQT4ReUYBLc7IRjw2MTIMTtofflo7HISY1cucvQk9/dYE76fQX i5qG6NqOGsrNpU9/9LkgwLSSjhOvzC/ChJaENUh7sObGICGmTop3QIY5TKS8udiX h/OuinzXP6Y= =eWlW -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Jim Cannell Area: Public Key Encryption To: Glen Todd 23 Nov 94 20:28:50 Subject: SecureMail UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a msg on , Glen Todd of 1:128/203 writes: GT> Can anybody tell me of a SecureMail hub serving Fido 1:128. GT> Thanks. Dave Munhollon is Region 15 SecureMail hub - 1:128/86 Jim - International SecureMail Host (ISMH) PGP key 1024/B7822B3D fingerprint = 0F F4 79 06 3B 33 99 D1 07 36 66 66 80 85 76 B3 Protect your right to privacy. Say no to GAK. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBLtQWwiWTIMO3gis9AQFd9AP/Xh0eFTMTz1QPMHgNeZQlsKdcASNAqODu caJTqgDrlrTurihENASFYNWQhLf/HHck5KFnLWrK11XiWJ3NJqaG0c50JonxMa2E 5e5BM5zenWLeaP3qAIElfz6TWBM1I2OmElpK/5IYbbLJ+XP2nlfgT2QkCdhUQziu j1xz+ILtKcQ= =0Aof -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718