From: Mark Drew Area: Public Key Encryption To: All 6 Feb 95 11:51:00 Subject: Edit Trust UpdReq -----BEGIN PGP SIGNED MESSAGE----- How do I edit the trust level of a public key on my public key ring? Say I want to change the trust level of John Doe from "I don't know" to to "always"... The DOCs say to execute 'PGP -ke useid ' but that asks for the userid's pass phase as if they were were going to edit their own public/secure key (which I have done for myself). PGP -h gives the exact same command line for both editing key name and/or pass phase and trust level. How can this be, and if so, what am I missing here? I don't get it? Help! Thanks. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzUj7pTeAMV8DT+pAQGCsAP/Wq8gOsiZhdcpSYL8nB0RpXc5O6z6K2DW 0nqREyHrmvKDXzkZXWqOTR120x2E9wNBZzn7QZd2gcBk5EpA7R4yG60JPGbyvjl2 kdTG55yB35AWLOvYS6ouLeq96C0u/MbprYMvt24N2B4iY+uKbsKiEeCnl/zyjrdu jMuqXR5JfGg= =gjjc -----END PGP SIGNATURE----- ___ Blue Wave/QWK v2.12 I got it! Don't practise on a name of someone whose useid is also on your secring. Duh! 201434369420143436942014343694201434369420143436942014343694718 From: Glen Todd Area: Public Key Encryption To: JIM BELL 6 Feb 95 14:24:34 Subject: PGP News 2 UpdReq -----BEGIN PGP SIGNED MESSAGE----- Despite the advice of tribal elders, JIM BELL said PGP News 2 to ALAN JB> I've previously commented that a more complex dynamic begins to JB> operate here. If the government can secretly decode, say, 1024 bit JB> keys with substantial effort, that would be an EXTREMELY precious piece It's the same dynamic that suggests that the _worst_ thing you can do about an enemy agent you've identified (assuming that the agent doesn't know that they've been compromised) is to shoot him/her/it. All that means is that the agent you know will be replaced with one that you don't know. By the same token, if the super-spooks ever let slip that they've managed to find a method of cracking, say, 1024-bit RSA, everybody except the terminal sheeple (you know, the ones that buy the Clipper chip) will abandon it poshaste in favor of something that Big Brother doesn't have the a way into. Thus, assuming that the NSA or whoever _were_ to come up with such a technique, they would never _dare_ risk compromising it by using evidence obtained using it in an ordinary court case (the transcripts of which would be a matter of public record.) Using such in a major (and highly publicized) case such as the World Trade Center bombing would be even worse, from their POV, because the attendant publicity would ensure that their code-breaking efforts would become general knowlege just that much faster. // Glen PGP F2F935C1 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: The right of the people to be secure in their persons and papers iQCVAwUBLzZ+AB1IzyRmn+dFAQG+FAP/Unc0tbfTLx9nmbevRJjlAp9PAMGEH7mx 3mEkAodDvdfBmm03Iinii4zW9gTKFF87Yz+HCe5xtNZ440lTYA82ggtpxIMq3t2v mZ13Ib2XTmNRYtnY8uTWj5MjISZiEy26kmbilpT/UroAIncXaPqzufWApwoBxrhA IRSIfdxndOw= =dlUA -----END PGP SIGNATURE----- ~~~ PGPBLUE 2.5 201434369420143436942014343694201434369420143436942014343694718 From: Jim Grubs, W8GRT Area: Public Key Encryption To: Ian Hebert 6 Feb 95 11:33:02 Subject: Can I Freq Pgp? UpdReq > MB> Had to beg my local sysop to let me 'sign' my messages, and got > MB> removed from fidonet for two weeks because someone sent ME an > MB> encrypted message via netmail...as if. > That's interesting.... a friend of mine in Sudbury led me to believe > tht Fido in Sudbury area was pretty relaxed, when it came to > encryption... I guess they're as bad as the rest... What are we dealing with here, the belief that only spies and other people up to noo good need encryption, or what? I think we need to expose people to more "legit" uses. We need, for example, to encourage the use of PGP signatures as program distribution archive integrity verifivations along side the other software distribution authentication systems already in use. Sincerely, Jim Grubs, W8GRT 201434369420143436942014343694201434369420143436942014343694718 From: mark lewis Area: Public Key Encryption To: Gordon Campbell 30 Jan 95 20:08:52 Subject: Key UpdReq -----BEGIN PGP SIGNED MESSAGE----- * Reply to a message in PKEY_DROP. GC> First, an explanation. Due to nasty system problems while GC> messing with a 2048 bit key, my secret ring got eaten. I GC> also was silly enough to not have a backup ring. Therefore, GC> I can't revoke it. If anyone has KeyID D0B18F11 on their GC> ring, please DISABLE it and replace it with the following GC> key: uh, dude... what's this?? i sure looks like a revoke to me? is this really you? ===== START ===== c:\pgp >pgp -kc 0xd0b18f11 Pretty Good Privacy 2.6ui - Public-key encryption for the masses. (c) 1990-1993 Philip Zimmermann, Phil's Pretty Good Software. 27 May 94 Date: 1995/01/31 01:08 GMT Key ring: 'c:\pgp\pubring.pgp', looking for user ID "0xd0b18f11". Type bits/keyID Date User ID pub 1024/D0B18F11 1994/08/17 *** KEY REVOKED *** Gordon R. Campbell <1:249/121.3 - 613-542- sig? 98A7ED35 (Unknown signator, can't be checked) sig! D0B18F11 1994/08/26 Gordon R. Campbell <1:249/121.3 - 613-54 ===== END ===== )\/(ark -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUBLy2OHJsj1FW2DCDFAQEz+wP+JNCZjNVuat+gfeSzBiyCUTPdDst2qjQE I0Ma2fa8ZsDLhmKi4vdWhzL1uRVPNUSl9yI9uSE2W/QdSgP9fEjWZyGwUQS57ChX xi/29hWr6KCBA4fsLcfsFKRNsx+S1ZQHfdyCuMtfavHAdoRq4qog/cmyq2vqQAir aJYRLUyg6wo= =hCdL -----END PGP SIGNATURE----- )\/(ark - 1024/B60C20C5 N.A.R.A.S. FingerPrint = 03 45 B1 CC 66 6C 05 95 F8 5D 97 0B F8 45 A9 62 # Origin: (1:3634/12) * Origin: PODNet <-> FidoNet EchoGate! (93:9600/0.0) SEEN-BY: 107/946 147/1077 259/212 382/7 640/217 3611/19 9600/0 9608/0 9609/0 201434369420143436942014343694201434369420143436942014343694718 From: Jeff Trowbridge Area: Public Key Encryption To: Shawn McMahon 4 Feb 95 21:00:26 Subject: inquiry UpdReq On (31 Jan 95) Shawn McMahon wrote to Alan Pugh... SM> Our custom is to give innocuous messages, even trivial ones like "gee, SM> Mr. G-Man, you decrypted this! I feel safer already!" subject lines SM> like "cocaine shipment schedules" or "that package for Saddam" or "the SM> crow flies by moonlight." I like that. I really, really do. :) Get my key from the PKEY_DROP echo. Just use subject lines like "not for public release" :) Regards, Jeff ... The way to a man's heart is with a broadsword. 201434369420143436942014343694201434369420143436942014343694718 From: Jeff Trowbridge Area: Public Key Encryption To: Jeffrey Bloss 4 Feb 95 21:07:18 Subject: pgp problems UpdReq -----BEGIN PGP SIGNED MESSAGE----- JT>> secure. :) I have the ascii amour =on in my config.txt file so when I JT>> sign a message I still just use the -s switch and ecrypting I use the -e JB> You're safe as can be. :) ASCII armor only means the encrypted data JB> or PGP signature is converted to text suitable for transmission via JB> message. It has no effect on the security of PGP encrypted data when JB> using the -e switch. Cool. Thanks for the info. I put my key in the PKEY_DROP echo last week and I'm going to resend it now that my SysOp has added his sig to it as certifying. Thanks Again, Jeff -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLzRc+3Pq8B1oZhD9AQFLFwP/a5mSaKMANG3S9a3FG0p5r7ml5BXQYwzi 6qRINLgI9InxAzSjIwp/vCNl7EmGQcEI8vZpH1TynUdX/IhLSNGpLzds7KXZAYgz +GBc5zHOvcnjDC1Rqmoimiw5r9DfGzKwOBL+bvkGb6ob5ALF4uY9b4J6XLkF7Hnz bTJ00A3aOCc= =/GgJ -----END PGP SIGNATURE----- ... If you smoke in a smoking jacket, what's a 'windbreaker' for? 201434369420143436942014343694201434369420143436942014343694718 From: Jim Bell Area: Public Key Encryption To: JEFFREY BLOSS 7 Feb 95 16:25:00 Subject: PGP NEWS UpdReq -=> Quoting Jeffrey Bloss@1:2601/551. to Jim Bell <=- JB>> I want that turkey to think: JB>> "They all know where I live and they don't like the fact that I'm JB>> harassing one of them. If I actually file charges who knows what'll JBl> That's all Philip Zimmermann needs... a bunch of intimidating letters JBl> sent to the prosecutor. :( That assumes that the letters are "intimidating." What about a few dozen "NICE" letters... mailed to his house? JBl> Think how YOU would feel if YOU went to JBl> the mail box every day and found several dozen "We know who you are, JBl> and we saw what you did" type letters?? My reaction would depend entirely on whether I had done anything to deserve such a reaction. JBl> If you feel the urge to do something, send a fiver to Philip's JBl> attorney, or send a NICE letter to a congress-critter type person. You JBl> can also support PGP by simply using it responsibly. I do. JBl> Don't make a big JBl> "thing" about it when you're told it's not welcome in a conference, or JBl> on a particular SysOp's BBS, but use and enjoy the freedom of the few JBl> places you can use it. In time, more and more people will accept it. JBl> They'll almost have to in the end... for the same reasons *we* support JBl> it already. :) They _already_ have to "accept" it. At least, the government has to accept the fact that PGP exists and people use it. JBl> The whole crux to the government's argument against encryption for the JBl> masses is the "fear" of what we'll do with it. Acting like spanked JBl> babies only gives credibility to that position. Acting like sheeple (you _do_ know what a "sheeple" is, don't you?!?) only encourages the thugs to continue their previous abuse. ... On what conclusion do you base your facts? ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718