From: Shawn McMahon Area: Public Key Encryption To: L P 30 Jan 95 10:05:38 Subject: Re: Pgp News 2 UpdReq Despite the stern warnings of the tribal elders, L P said this to Shawn Mcmahon: SM>>The weak point in PGP is the RSA encryption LP> Is this something that you could explain here (if so, please do) or do LP> I need some background to understand? In short, IDEA with a 128-bit key has a keyspace as large as RSA with a 3000-bit key. Therefore, if an attacker wants to break your message, he'd be better served trying out all the possible RSA keys instead of trying all the possible IDEA keys. This is not to say that PGP's use of RSA is weak; just weaker than it's use of IDEA. A 1024-bit key is still beyond the known or projected reach of any attacker today, and a 2048-bit key may *NEVER* be crackable. Let's put it this way; a one megaton nuclear bomb is weaker than a two megaton nuclear bomb. :-) LP> Does this have anything to do with the difference (if any) between the LP> encryption used in pgp23a as opposed to the MIT versions? There is no difference. PGP 2.3a simply used an implementation of RSA written by the author. The MIT version uses an implementation written by RSA Data Security, Inc. Both versions produce identical output. LP> This question no doubt displays my ignorance, but there's LP> no such thing as a dumb question, right? I had a photography teacher who used to say that. Now he says there's no such thing as a dumb question, except for the question Mark Dimmit and I asked: "Do helicopters eat their young?" :-) 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Chris Adams 30 Jan 95 10:12:14 Subject: PGP News 2 UpdReq Despite the stern warnings of the tribal elders, Chris Adams said this to Shawn McMahon: CA> Did you see my post earlier about a trojan password? (ie would reformat CA> HD upon entry)? Yeah. Instead of cluttering up the PGP code with it, you could write a TSR that checked keyboard entry for some combination. You run the risk that somebody will be using your computer legitimately and type that word, unfortunately; but you don't expand the PGP code size with an extremely large, OS-specific feature. Remember, besides the added password checking, you'd have to either duplicate the FORMAT program for *EACH* target OS, or add code to call the FORMAT program. And that'd depend upon the filename. BTW, any intelligent cop is gonna boot from a floppy and use RAWDISK or something similar to make a complete copy of your drive, then attempt to break encryption on the copy. Rest assured the NSA or somebody like that will remember to do so. 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Chris Adams 30 Jan 95 10:22:52 Subject: Quotes as passphrase UpdReq Despite the stern warnings of the tribal elders, Chris Adams said this to David Chessler: CA> Not that kind of format, just wipe the key, file, and zap the fat. Not even worth the effort; you can fix it in seconds. 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: David McIntyre 31 Jan 95 11:37:14 Subject: Re: Quotes as passphrase UpdReq Despite the stern warnings of the tribal elders, David McIntyre said this to Chris Adams: DM> Write it into your code. The source is freely available. The only DM> problem is, if the person trying to decrypt your message was smart, DM> they'd just use your keyfile and their binaries. And if he *ISN'T* smart, he's not going to decrypt your message anyway. So it's not worth the bother. 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Alan Pugh 31 Jan 95 11:40:08 Subject: inquiry UpdReq Despite the stern warnings of the tribal elders, Alan Pugh said this to DONALD ROSE: AP> i like to send random messages across the internet with zero content AP> to give the spooks in the nsa something to do. Our custom is to give innocuous messages, even trivial ones like "gee, Mr. G-Man, you decrypted this! I feel safer already!" subject lines like "cocaine shipment schedules" or "that package for Saddam" or "the crow flies by moonlight." If both sides were running the proper software, I'd encrypt my AREAFIX messages. :-) 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Jim Bell 31 Jan 95 11:43:04 Subject: PGP NEWS UpdReq Despite the stern warnings of the tribal elders, Jim Bell said this to Rob Szarka: JB> "They all know where I live and they don't like the fact that I'm JB> harassing one of them. If I actually file charges who knows what'll JB> happen. I think I'll drop the whole thing." He might instead think: "Screw with me, huh? I'm not afraid of a bunch of pocket-protector wearing, Star-Trek-watching geeks. I'll just see to it that Mr. Zimmerman gets charged with everything I can come up with, including mopery, dopery, and barratry, to show those bastards. I can always get a post-office box for important mail." 201434369420143436942014343694201434369420143436942014343694718 From: Julian Gibson Area: Public Key Encryption To: All 1 Feb 95 09:48:14 Subject: windows nt help? UpdReq hello i work at a non-profit organization and were trying to load windows nt as a server for our network....but it doesnt want to load... heres what happens : at d:\i386 i type winnt which makes three disks.. i use those disks to start the installation process i get through all three disk successfully and i am then prompted to take the disk out of the disk drive and reboot...once i reboot it locks up any idea what may be wrong? can anyone help us? if so wed be more than greatful....thanks j. my email address is : julian@onmacon.com 201434369420143436942014343694201434369420143436942014343694718 From: Bruce Davis Area: Public Key Encryption To: Mark Drew 30 Jan 95 04:56:10 Subject: PGP and BWave UpdReq -----BEGIN PGP SIGNED MESSAGE----- -=> Quoting Mark Drew to Tim Witteveen on 01-24-95 07:57 EST <=- TW> I am useing BWave 2.12 Off-line mail reader. MD> As am I. I am also using Ezquote v. 4 as the editor I too, use Blue Wave. Used it for years, and even after switching to Windows...won't switch. There is an Interface for Blue Wave and PGP called PGPBlue. I've been using it for about 6 months and it is great. Fully Functional and it greatly eases the whole PGP process. - -- ******** Bruce Davis ******** bruce.davis@mercopus.com ******** Tampa, FL ******** 70214.2670@compuserve.com -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLyw0fXPGy9VvHHfxAQGgogP/QXhXggKHEp79QfoajepTYN1WGWQ1yBCM 92ReElv03ehVcHT/C4650SHPSU9RV6a9piymF5alYIwsJsY+FZ9SsHrGrAnn51u4 iNvIpqfbUbz0xm/v7qmNkzPaJKG4SnBvKcoyMkgP1Oj2HcHT73DlrclWGbZXyy9C sEV38kBR/Kc= =HJVh -----END PGP SIGNATURE----- ~~~ PGPBLUE 3.0 ___ Blue Wave/QWK v2.20k Beta 201434369420143436942014343694201434369420143436942014343694718 From: Bruce Davis Area: Public Key Encryption To: All 30 Jan 95 04:56:10 Subject: Signature Comments? UpdReq -----BEGIN PGP SIGNED MESSAGE----- I see that some of you have comments included in your PGP signature, directly under the version number. How do I add comments to my signature? - -- ******** Bruce Davis ******** bruce.davis@mercopus.com ******** Tampa, FL ******** 70214.2670@compuserve.com -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLyxAO3PGy9VvHHfxAQHPpwP8CF87W7c1VbDBykAO0jJT2RIjazMhsiEP nn81CNDyFjAyKMUt+UGF1jbup3sEahUbUp+ZEyVoVgsJbTP3WEH1+dyJ/zN+xQvK K8Fy0dRHe3Gs5dDN3tjEDLjT5Zk8NsjlTuqIlpG1DgJioxpKpnGqSO18tYGsTD85 Y+P+hVBaxcw= =VKPU -----END PGP SIGNATURE----- ~~~ PGPBLUE 3.0 ___ Blue Wave/QWK v2.20k Beta 201434369420143436942014343694201434369420143436942014343694718 From: Glen Todd Area: Public Key Encryption To: Lawrence Garvin 29 Jan 95 12:07:38 Subject: PGP Forever !!! UpdReq Bright the day, Lawrence! Tuesday January 24 1995 21:41, Lawrence Garvin wrote to William Hattenhauer: WH>> Never forget! Just who's government is it anyway? WH>> What could anyone gain from encripting a message in PGP WH>> (that the government can NOT read) that could possibly cause WH>> them to REACT as they are now doing? WH>> Answer: a. The Truth! WH>> b. Political Incorrect Ideas. WH>> c. Unfiltered News. WH>> d. Alternative Thought Sources. WH>> e. ALL OF THE ABOVE + LG> All of which are protected by the First Amendment. :) Which seems to matter not one whit to our government -- and it looks like the new Republican (aka religious reich) congress is going to make things worse for the First Amendment rather than better. Wind to thy wings, Glen ... * <- Tribble. . <- TRIBBLE.ZIP. 201434369420143436942014343694201434369420143436942014343694718 From: Marc Stuart Area: Public Key Encryption To: Tim Witteveen 24 Jan 95 08:46:00 Subject: PGP and BWave UpdReq TW> I recently acuired PGP 2.6.2. I have tried to send a message to the TW> friend who gave it to me. I am useing BWave 2.12 Off-line mail reader. FREQ PGPBLU from me or stop by at the number below. ~~~ PGPBLUE 3.3 beta ... It's so true to life it's hardly true. 201434369420143436942014343694201434369420143436942014343694718 From: Randy Edwards Area: Public Key Encryption To: All 30 Jan 95 17:30:32 Subject: E-Mail Security - New book by Bruce SchneierUpdReq * Original Message Posted via ANEWS * Date: 26 Jan 95 15:57:08 * From: Randy Edwards @ 1:325/805 * To: All * Forwarded by: Christopher Baker @ 1:374/14 * Message text was not edited! @MSGID: 1:325/805 0090c23a Reply-To: Bruce Schneier E-MAIL SECURITY WITH PGP AND PEM: HOW TO KEEP YOUR ELECTRONIC MESSAGES PRIVATE ...a new book by Bruce Schneier John Wiley & Sons, 1995 ISBN 0-471-05318-X $24.95 The world of e-mail is the world of postcards. Between you and your correspondents may lurk a foreign government, a business competitor, an overzealous law enforcement agency, or even just a nosy neighbor. The problem is, all of these potential eavesdroppers, given fairly simple access tools, can read your messages as easy as a postal worker can read your postcards. E-MAIL SECURITY is about protecting electronic mail fm spies, interlopers, and spoofs--people who may want to destroy, alter, or just look at your private communications. The book shows how you can protect the financial information, contract negotiations, or personal correspondence you entrust to public or private networks--and it shows how this protection is available right now, with free or inexpensive software. The book discusses PGP and PEM: how they work, how they are different, and how to choose which one is right for you. TABLE OF CONTENTS: Part I: Privacy and Electronic Mail Chapter 1: The Problem Chapter 2: Encryption Chapter 3: Key Management Chapter 4: Authentication Chapter 5: Certificates Chapter 6: Keeping Your Private Key Private Chapter 7: Odds and Ends Chapter 8: Patents, Governments, and Export Laws Part II: Achieving Electronic-Mail Privacy Chapter 9: Requirements and Features Chapter 10: Privacy Enhanced Mail (PEM) Chapter 11: Pretty Good Privacy (PGP) Chapter 12: Comparing PGP and PEM Chapter 13: Attacks Against PGP and PEM Appendix A: Pretty Good Privacy Appendix B: Privacy Enhanced Mail ***************************************************************** If you are interested in a copy of E-MAIL SECURITY, please send a check for $25 + $5 postage (ask for rates abroad) to: Bruce Schneier 730 Fair Oaks Ave Oak Park, IL 60302 The book won't be available until at least the end of the month, so please be patient. @ Origin: Socialism OnLine! * Home of ANEWS * Venceremos! * (1:325/805) @PATH: 325/805 3615/50 374/1 98 14 201434369420143436942014343694201434369420143436942014343694718 From: Jeff Trowbridge Area: Public Key Encryption To: Jeffrey Bloss 29 Jan 95 19:38:22 Subject: pgp problems UpdReq -----BEGIN PGP SIGNED MESSAGE----- JB>>> BTW, when you encrypt a file with the ascii armour (.asc JB>>> AG> extension) JB>>> JT> is it just as secure as one encrypted by binary (.pgp extension)? JT>> AG> Yes. JB>Ummmmm... You *are* talking about encrypting with the '-ea' switches JB>in unison... not just '-a' right?? Sorry if I missed something, but JB>on the ODD chance you're not aware of it, '-a' doesn't really encrypt. JB>It's PGP's form of UUENCODE. I'd really hate for ya' to be sending JB>that million-dollar tax return to your accountant thinking it was JB>private, while ANYONE could read it. ;-) I wish I had to worry about keeping a million dollar tax return secure. :) I have the ascii amour =on in my config.txt file so when I sign a message I still just use the -s switch and ecrypting I use the -e switch and the file comes out .asc. I'm assuming it's using the encrypt not the UUENCODE. Thanks for the info. BTW, I posted my key in the PKEY_DROP echo so you can get it there if you want to verify the sig. Regards, Jeff -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBLyxenHPq8B1oZhD9AQGxrwP/QEPA96ruOw1G+2JzrTruPUYNMh4meeL7 qEGDvx1R+A4izk+84ZoSYyk59Lx4pcYmI7XvOFoW6A1VhuqGVg7X5Zo0+8nmecmn sN4aJnbF27XWspdWYSud5wdzphhk3IA2uPMZOkreos+TZseclTSYtR+n4scllxLr 0/CiHTmgEhw= =4OJL -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Jeff Trowbridge Area: Public Key Encryption To: DONALD ROSE 29 Jan 95 21:35:34 Subject: inquiry UpdReq On (24 Jan 95) DONALD ROSE wrote to ALAN PUGH... DR> Not that I'm planning the overthrow of a country or anything, DR> but what's the scoop on passing messages with a significant DR> portion in code? DR> ... Donald.Rose@f506.n103.z1.fidonet.org * 24 Jan 95 / 21:54:48 Your message just plays into the paranoia of those who would outlaw the use of encryption by "ordinary people". I don't have to have a need to encrypt, I can encrypt just because I want to. I don't have to mail postcards, I can use paper and envelopes, it's my choice. -JT 201434369420143436942014343694201434369420143436942014343694718 From: Shawn K. Quinn Area: Public Key Encryption To: Lawrence Garvin 28 Jan 95 10:03:10 Subject: PGP Forever !!! UpdReq *** Quote: Lawrence Garvin to William Hattenhauer *** Subject: PGP Forever !!! *** Date: 24 Jan 95 21:41:47 WH> Answer: a. The Truth! WH> b. Political Incorrect Ideas. WH> c. Unfiltered News. WH> d. Alternative Thought Sources. WH> e. ALL OF THE ABOVE + LG> All of which are protected by the First Amendment. :) The First Amendment means little these days. SKQ 201434369420143436942014343694201434369420143436942014343694718 From: Alan Pugh Area: Public Key Encryption To: Chris Adams 28 Jan 95 18:01:04 Subject: PGP News 2 UpdReq CA> I was exagerating. I'd just like, say, 16k bits, or 8 times more. It CA> would be slow, but most of the public key stuff is used to encrypt the CA> IDEA session key, and IDEA carries the load, so it would need to be CA> augmented as well. Also, if the source code is designed right, it CA> would be relatively simple to add support for larger keys. Also, as PCs CA> increase in speed, PGP can take advantage of it. Someone with, say, a CA> Pentium 90 isn't going to notice the wait for a small key, so let them CA> wait a little for a larger one. hi. from what i've read on this, a 2048-bit rsa key is pretty much equivalent in difficulty to break using brute force as a 128-bit idea key. therefore, you can increase the key size of the rsa portion all you want and it won't help you any, because it will simply become easier to crack the idea key rather than the rsa key. i've got a file around here somewhere that goes into details that i quite frankly don't entirely get. the math is a bit over my head, but when i puzzle on it a while, what they say and show (in the math) makes sense. this is why i use a 2048-bit key. i just don't see much point in getting much bigger, though a 3k-bit key would be reasonable imo - just to make sure they will attempt a crack on idea rather than the rsa key. all of the above is predicated on the belief that the nsa has not discovered a novel way to factor numbers that we peasants aren't allowed to know about. they also may have discovered an inherrent weakness of pgp. in general, i operate on the assumption that they can read my mail no matter what i do because anything else is foolhardy imnsho. remember: the nsa has a bigger (black) budget than the fbi & cia combined, and encryption is their thing. if they have discovered such a weakness, it will come out eventually. a lot of people are hacking pgp right now. amp <0003701548@mcimail.com> January 28, 1995 17:59 ... PRIVACY is Important! Use PGP Regularly. 201434369420143436942014343694201434369420143436942014343694718 From: Alan Pugh Area: Public Key Encryption To: Chris Adams 28 Jan 95 18:06:38 Subject: Quotes as passphrase UpdReq -=> Chris Adams was saying something about Quotes as passphrase CA> On (25 Jan 95) jason carr wrote to Chris Adams... CA> Which is why it would be neat if PGP had a FAKE password CA> that, when entered, would "accidently" reformat the CA> harddrive after wiping the key! jc> Wow, I hope they're cracking on =their= machine, not yours. :-o CA> Well, would you like them to have everything on your PC? That's why it CA> would be good to have the ability to pick a back-door key that would CA> wipe the keyfile at least, possibly even zapping the HD! don't ya think the first thing they would do is take a dump of your disk? if they have your disk, you are toast. most likely they will have you as well. i have zero faith that the nsa is above using thumbscrews or racks if they feel it is expident. later, amp <0003701548@mcimail.com> January 28, 1995 18:6 ... BATF: Burn All Toddlers First 201434369420143436942014343694201434369420143436942014343694718 From: Alan Pugh Area: Public Key Encryption To: Christopher Baker 30 Jan 95 10:40:06 Subject: that availability list you posted in parts [Was: Re: Can I Freq Pgp?]U -----BEGIN PGP SIGNED MESSAGE----- -=> Christopher Baker was saying something about that availability list you posted in parts [Was: Re: Can I Freq Pgp?] CB> -----BEGIN PGP SIGNED MESSAGE----- CB> In a message dated: 24 Jan 95, Alan Pugh was quoted as saying: AP> Origin: The Soapbox BBS - "Your Infotainment Specialist" (1:151/142) CB> is that list of ftp and other sites where PGP may be found available CB> in fileform at your address above? CB> i asked this about a week ago and got no response. i meant to write CB> those msgs you posted to a file but waited too long and they had CB> scrolled off this end. sorry 'bout not responding. i don't recall seeing it, but i may have just let it slip through the cracks. i'll be posting it on the board as the file wherepgp.zip in file area 1000. i don't know if you can freq it as i'm not the sysop. my friendly sysop is stacy powers. i'll leave him a copy of this message (if i can figure out how to cc messages with this software) the file is periodically revised and posted to the cypherpunks mailing list. as long as we don't have to bother my sysop every time it is updated, i can kill the existing and update it with the new one and let you know that it is available. or, if you have an internet address, i can send the thing to you there. i've had difficulty posting through fido, so if you have another way of recieving mail, that would be preferable. i don't think i can do netmail, and some sysops won't pass encrypted mail due to their own paranoia. if you can send me a message to the address 0003701548@mcimail.com i can more easily get messages back to you. amp <0003701548@mcimail.com> January 30, 1995 10:38 CB> if available as a file, please advise filename. CB> thanks. CB> TTFN. CB> Chris CB> -----BEGIN PGP SIGNATURE----- CB> Version: 2.6.2 CB> Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] CB> iQCVAwUBLysjVssQPBL4miT5AQFTqQQAiGKcgP4Q/sO5e9HEcMWNqW3WX0rVq3HG CB> a/4uE5G6l/OQF/EOdNt3QmWyOfLG1pNzOBCJxZR9EUMDY6EtBcLHsJbrkbw/lVGY CB> vJMRxUWhGi6CXxaFSF2AKyvUV46NtQzfkN0nIa6PYU33Gx84CKOQkD2lagl4aVVO CB> n/kKDWYLmiw= CB> =GCBs CB> -----END PGP SIGNATURE----- CB> -!- GenMsg [0002] (cbak.rights@opus.global.org) CB> ! Origin: Rights On! for Privacy! It's a Right not a privilege! CB> (1:374/14) -----BEGIN PGP SIGNATURE----- Version: 2.61 iQEVAwUBLyzd5ygP1O9KJoPBAQF5jggAlE8PCdYLj08T3+hBn9zZz2yRR42KTMom wIG3/VSXKbXlAEaOhetp8wugBB6C1f2z9xVY2jZNdLsIntiy2OQFJ+MisQFZZfZO 8OXDEiD74+dJK3VvchkDSg9nreUrWPfPV6m+0gmvn+iBt+RAXoYsZzblTJdlFt03 d/fx1kPd5MJ7NPDtzwLTu24JRt5k/1VzX4lCsIrFQ/T0siMqoq1QysbNbLo+FZ0n bQzdheawXsaYzfy+WwcdQNoKmRV6NgIWNnw4BqhjdIeaEoMfLtivvxNvCxCobqq4 YyeMoU5CujAoh1VzD+mv0GIN1B9V12YRo5mk5uYA2aHRJhpyqioPVw== =n4o2 -----END PGP SIGNATURE----- `~~~ PGPBLUE 2.5 ... The Law should be _Defensive_ not _Offensive_. 201434369420143436942014343694201434369420143436942014343694718 From: Gordon Campbell Area: Public Key Encryption To: L P 30 Jan 95 12:58:52 Subject: Pgp 2.6.I UpdReq -----BEGIN PGP SIGNED MESSAGE----- On (27 Jan 95) L P wrote to All... > How does the language.txt need to be modified so that the program > would > display a different version number? > =======End quote======== I'm also using 2.6.i and couldn't find any mention in the language file. Staale Schumacher gives his e-mail address in the archive, why not ask him? Why does your friend feel the need to hide the version? I'm curious. He's not in the US, so why not flaunt it? ;-) Cheers, .....G -----BEGIN PGP SIGNATURE----- Version: 2.6.i Comment: Help! Help! The paranoids are after me! iQCVAgUBLy0pSIomCDt60qk9AQFbCgQAkCfIIyGuF7XfOrflicLTodUX2xc6dUkx 0eMq5NOAJr3xAFuCxuPF6w6kp33uILexL+y4M1+gXCSfNoe6yXauIBjVjhsOBEzl DKT6hR8ESCwJuv16GAYheImSvejyHoZYAI47u97lCTXFcbS7RSCTsRQw0nUR7pNk NRkkJyte450= =J/0h -----END PGP SIGNATURE----- ... Genealogy: tracing us back to the same brother & sister. 201434369420143436942014343694201434369420143436942014343694718 From: Jerome Greene Area: Public Key Encryption To: DAVID BROOKS 31 Jan 95 14:35:32 Subject: Re: PassPhrase UpdReq -----BEGIN PGP SIGNED MESSAGE----- After taking on the world DAVID BROOKS proclaimed : Hi David! DB> So tell me, how did you get the comment added to your sig? I have DB> not seen any mention of it in the PGP docs nor have I seen any DB> mention of it anywhere in the program itself... how do you do it? It's in the CHANGES.DOC of the original archive. Here's what it says: If the line comment= appears in the config file, the line "Comment: " appears in ASCII armor output. Of course, you can also use this from the command line, e.g. to include a filename in the ASCII armor, do "pgp -eat +comment=filename filename recipient". Just two ways to do it. Regards, -=Jerome Greene =- ... All rules have exceptions-except the ones that don't. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLy6fKHF52VfebiBFAQE42wP+Or/QAtbs4Lv7QpP8W9kWUG4hGqC+yKAA hlodgFdT5UyuOh0Zb+Y95gCl2n4oTU6Tywz2+hvNtJi5IN9FAys72ptoGiEaM5rn pDFyyAoyr/NjGgR1AhpdjB+mbwx4fEKV9490KBDW+jy4FGeLLD4KV3SucBvhl9hw T2ed5Bktei8= =TMjc -----END PGP SIGNATURE----- **EZ-PGP v1.07 201434369420143436942014343694201434369420143436942014343694718 From: Frank Hicinbothem Area: Public Key Encryption To: Chris Adams 30 Jan 95 11:34:02 Subject: PGP News 2 UpdReq > Did you see my post earlier about a trojan password? > (ie would reformat HD upon entry)? The cops/feds/TLAs are not stupid. They do not work from your original machine and drives; in fact, if they want to use any info they gain as evidence, they *CAN'T* do so. In addtion, when seizing a computer, they have some nifty tools that will prevent disk writes and other nasties. Besides, if you have any information that is worth their beating it out of you, you may as well give it up. If it comes down to that, they'd probably rather have you dead than available to testify. 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Bruce Davis 31 Jan 95 15:31:28 Subject: Re: Signature Comments? UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 30 Jan 95, Bruce Davis was quoted as saying: BD> I see that some of you have comments included in your PGP BD> signature, directly under the version number. BD> How do I add comments to my signature? add this line to your CONFIG.TXT: comment=whatever you want to say but keep it short. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] iQCVAwUBLy6eI8sQPBL4miT5AQFJEQP/b2roGE/UdfznlnskKjXkXlH1gsWqyGPK vArXLbtMoAKlCzFYAt3F8vxBORef0TnE0cinhGvz2Yjtkk2C59FEPQsb+27z1h8Z 9Ov0UIQG5O6Sr4yBhYr/EBmpOYnbQPyYLm99cIFZKI9rtAC9D+mX7pQZPAl/bEO2 i6IOfgnmHV0= =kC1z -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: David Chessler Area: Public Key Encryption To: Jim Bell 30 Jan 95 09:49:00 Subject: Pgp news UpdReq On 01-28-95 (01:01), Jim Bell, in a message to Floyd Drennon about "PGP NEWS", stated the following: JB> JB> [JB note: Somebody ought to find William Keane's _home_ address >and > JB> post it on the Internet. After a few hundred nasty-grams have >arrived, > JB> maybe this numbskull will get the picture.] JB>FD>Nothing like good old vigilante action when we don't agree with >something, huh >FD>Jim? JB>First, I did not mention "vigilante action," you did. (What I did >suggest was a little peer pressure, a little "friendly persuasion.") It's still a dumb idea. Nothing like mailbombing literally or figuratively a prosecutor to get him really pissed off. And then he can prosecute even if he thinks he doesn't have a case. JB>However, that is, essentially, what Keane is doing with respect to >Zimmermann. But not quite: the difference is that even "vigilante >action" professes to punish crime. Zimmermann did something (writing >PGP) the government doesn't like, but isn't illegal, so its >representatives aren't even rising to the level of engaging in >legitimate "vigiliante action" to use your words. In Zimmermann's >actions, there is simply no "crime" to punish. That's your view, but you're not a lawyer. So the prosecutor isn't going to pay any attention to you. But if his mailbox fills up with nastygrams or worse, he may take it out on Phil just to spite you. There is *absolutely nothing* you can do that will convince the prosecutor to lay off Phil (unless you have real clout--are you a heavy campaign contributor to anyone; do you run a PAC?). And anything you do will only make things worse. JB>They are engaging in threats, extortion, abuse of their offices, and >probably plenty of black-letter-law crimes, but naturally they will >never be punished, because that's not the way this country works, >unfortunately. And it doesn't help when you try it. -- ___ __ david.chessler@neteast.com d_)--/d chessler@capaccess.org chessler@trinitydc.edu * SLMR 2.1b * E-mail: ->132 1:109/459 david.chessler@neteast.com 201434369420143436942014343694201434369420143436942014343694718