From: Michael Burhans Area: Public Key Encryption To: Shawn Mcmahon 31 Jul 94 06:05:00 Subject: Trying things out. Quoting SHAWN MCMAHON to MICHAEL BURHANS concerning TRYING THINGS OUT.: SM>Your editor or mailer mangled your key. I've deleted all but the last SM>couple of lines, which were the only mangled ones, to show you SM>what happened: Thank you. SM>The last 8 characters on line 1 should be a line all to themselves, the SM>first five on line two should also be a seperate line, and the SM>"END PGP" line should be on a seperate line as well. I'll look into that, thank you for the warning. SM>BTW, for the future, you shouldn't post keys in this echo; they belong SM>in the PKEY_DROP echo. Okay, thanks again. I'll toggle that one in my scan. Michael R. Burhans Message written at 6:05am, on Sunday, July 31, 1994. * Apex v4 * He's just another scripture thumping hack from Galilee... * michael.burhans@wolverine.com <*> Finger for PGP Public Key * SLMR 2.1 * 201434369420143436942014343694201434369420143436942014343694718 From: Jess Williams Area: Public Key Encryption To: Scott Miller 4 Aug 94 10:41:00 Subject: PGP VOICE -=> Quoting Scott Miller to Jess Williams <=- SM> I even SM> sent about a 5 second voc file across the modem, and it averaged SM> about 1630 cps. SM> The problem is now, 6 you need a fast system, or good software, that SM> can process, encrypt, send and receive at a decent pace. That would be very cool if this whole thing could be done with sound cards. A lot of people have them so if it was just a matter of software I think this whole thing could be done rather quickly. Even if everybody started out with a version that wasn't "Top of the Line", I think that would spark peoples interest and improvements would be made at light speed. TTFN Jess Williams :) ... A mountain is climbed a step at a time. ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Christopher Baker 5 Aug 94 07:42:32 Subject: PGP lore [Was: Steve Winter] -----BEGIN PGP SIGNED MESSAGE----- - --> Note: Reply to a message in MODERATOR. Christopher Baker wrote in a message to Rick Ashworth: CB> relates to this Echo. okay, here are the technical answers CB> [always available in the PGPDOC and PUBLIC_KEYS Echo]. CB> [grin] I'm FATTaching him PGP_FAQ and 2.6 tonite. I hope he'll look over 'em... jason -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLkJQGkjhGzlN9lCZAQHUzwP9G5oTQ0UpetGI8CSApm/h/NjA00Te8wX2 mI/t7g+I6UWGOoWrYZt5h4dpVL24E1UtNhri78mQkxiiIt/FOqZ7dBuypxZ83IrT 3RsltS9sAI7WfsUJUcVesLxSh5pt9O5IJ3Z6cGajjvk1K3sl78ATp/bzwQLlnzpO UPy0MwoX1fQ= =uFyF -----END PGP SIGNATURE----- ...Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Christopher Baker 5 Aug 94 08:08:38 Subject: Re: Re: New to PGP -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 01 Aug 94, Jason Carr was quoted as saying: JC> You mean that the Snooze itself was clearsigned? Hmmmm, good idea. >> >> no, but it had its own public-key if you wanted to send something >> to it using that key. Ah, so. Good idea, but a little weird. I mean, yer sending something that you want =published= fer chrissake. :) Clearsigning =to= the snooze seems like the answer to the SWinter thang. JC> be removed for including digisigs or posting blocks (other than JC> your own echoes, I mean)? >> >> 'my own Echos'? i enjoy no immunity to the specs of the Backbone. I know. But I suspected they would have hassled you... >> the Backbone doesn't care about Echomail content that isn't illegal >> or interfering with FidoNet mail ops. content is decided by the >> Moderator and as indicated in the EListing. Yeah, but so many people misunderstand. :( JC> Did you have any problems with the fidogods about starting these JC> echoes? >> none at all. Tom Jennings was one of the first proponents. [grin] Always knew TJ had good sense. :) jason -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLkJWykjhGzlN9lCZAQHyvAP8CEBHdrHB1pJLpIl3hQRBIVLW2Fgwv1Lr llP9mJxUy3bWRS2scuLgWx42Zh/Y+54qhQXTHrIsb09MT2yOuldfnbkSXOw/W87H RMyP6eXonotVBZ39j4PSQaBwDVFNrwYnQSLjHwfiFic8Ih5c0g/zlGUKZcsseJ74 BwbCE0rHuH4= =IAxA -----END PGP SIGNATURE----- ...Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: Ian Hebert Area: Public Key Encryption To: Christopher Baker 31 Jul 94 12:10:10 Subject: New to PGP CB> RS> To make this message more on-topic. Since the recent "Steve Winter CB> RS> Episode" what does everyone think about making PGP signatures the CB> RS> norm in Fight-o-Net? Also, what is the view on the use of PGP CB> RS> signatures in Fight-o-Net echos? CB> FidoNews used to have a PGP public-key when Tom Jennings was editor. CB> [sigh] Yeah... Let's not forget that Tom Jennings, as a gay rights activist, has been forced to adopt a defensive philosophy when it comes to privacy. Steven Levy quoted him in his article, "Crypto Rebels", which appeared in WiReD 1.2 (June 1993): ...Tom Jennings, founder of the FIDOnet matrix of computer bulletin boards, finds the software useful, but becomes positively rapturous as he contemplates its psychic influence. To Jennings, a gay activist, cryptography has the potential to be a powerful force in protecting the privacy of targeted individuals. "People who never have had cops stomping through their house don't care about this," Jennings said. He believes that public awareness of these issues will be raised only by making the tools available. "If you can't demonstrate stuff, it's hard to explain." On the other hand, said Jennings, "If we flood the world with these tools, that's going to make a big difference." Maybe this incident will get the current editor to wake up; particularly if any legal action ensues. Ian Hebert London, Ontario, Canada Fido: 1:2401/114 Internet: ian.hebert@homebase.com PGP Key: 1024 / 077A2F7F 1993/02/11 PGP Key Fingerprint: A2 15 DE 22 DA FE D4 DC 0F 17 43 24 1F F2 1E 7B * RM 1.3 * Eval Day 163 * ... NEW FUNDY MOTTO: Support Pro-Life or I'll kill you. 201434369420143436942014343694201434369420143436942014343694718 From: Ian Hebert Area: Public Key Encryption To: All 31 Jul 94 18:40:10 Subject: Using PGP ver 2.6 ************* Original From: VESSELIN BONTCHEV * FORWARDED * To: ALL * MESSAGE * Date/Number: 07/27/94 - 0004460 ************* On: HOMEBASE - 3299 - alt.security. |29 ----------------------------------------------------------------------- *@FROM :BONTCHEV@FBIHH.INFORMATIK.UNI-HAMBURG.DE Message-ID: <315c15$14n@rzsun02.rrz.uni-hamburg.de> Newsgroup: alt.security.pgp Organization: University of Hamburg -- Germany globalwi@clark.net (globalwi@clark.net) writes: > If you use PGP ver 2.6 to perform standalone encryption, like PCSECURE by > PCTools, does it over the three grades of encryption (low, med, military) > and even if it doesn't, is it better than multiple (2 or more) passes > with a utility that (like PCSECURE) uses DES. Any help without getting > too complex would be greatly appreciated. Thanks PGP uses only one kind of secret-key encryption: IDEA. This is believed to be a very secure cypher - much more secure than DES, for instance. I don't see why you would need the lower-lever security encryption modes. However, if you are using the "DES implementation" that comes with PC Tools - beware. Somebody (Peter Gutmann, I think) has analysed it and has found that it implements a 2-round "DES"! If you are knowledgeable about cryptography, you are supposed to laugh here. If not, have in mind that the "standard" DES has 16 rounds and an implmentation of up to 8 rounds (I think; could be 4) is breakable on a personal computer. Conclusion: don't trust commercial encryption programs, produced by companies that do not have a long reputating of specializing in crypto products - such programs are almost always very insecure. Regards, Vesselin -- Vesselin Vladimirov Bontchev Virus Test Center, University of Hamburg Tel.:+49-40-54715-224, Fax: +49-40-54715-226 Fachbereich Informatik - AGN < PGP 2.3 public key available on request. > Vogt-Koelln-Strasse 30, rm. 107 C e-mail: bontchev@fbihh.informatik.uni-hamburg.de 22527 Hamburg, Germany * RM 1.3 * Eval Day 163 * CANADIAN DOS: Format c:? Yer sure, eh? [S]ure [N]o-way 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: John Cruz 5 Aug 94 18:10:00 Subject: serious problem [Was: My public key] -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 04 Aug 94, John Cruz was quoted as saying: JC> Here is my public key. Any test messages to me would be JC> appreciated. Thanx! your key is severely mangled. you are also using an old and buggy version of PGP. JC> -----BEGIN PGP PUBLIC KEY BLOCK-----Version: 2.3 JC> m JC> Q JC> C JC> N JC> ....much deleted JC> i JC> Z JC> z JC> 6 JC> 0FUpvaG4gPEFnZ3Jlc3Nvcj4gQ3J1erQVSm9obiA8QWdncmVzc29yPiBDcnV6=ZI/P- JC> ----END PGP PUBLIC KEY BLOCK----- every line of your 'key' was improperly truncated. get yourself a copy of the current PGP or even 2.3a and try again. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: PGP 2.6 is LEGAL in Zone 1! So USE it! [grin] iQCVAgUBLkK4rMsQPBL4miT5AQH5/AP+Oe3KDegtJQG6UbRUbZKRMZKAcO5Px1CB QY/Hqz6QzSRkQ3e48zHy4R4hOaJ3LX/oTH6jiO4qbs8uIc7vxAM87TcRRa4K3i22 YTYFB2jAUal3Ud8nvH519y98V0l3MAR0VqQmTyc5ZSaZfz6AT4S55rPvytubi6ha 284Rzk16IdU= =bhUj -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Lee Dohm 5 Aug 94 18:11:58 Subject: somebody fix this please [Was: On this subject...] -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 28 Jul 94, Lee Dohm was quoted as saying: LD> # Origin: THE CHANGELING BBS * LEE DOHM * 916-635-2302 * LD> (1:203/111) LD> GPTH: 203/111 153 530 396/1 3615/50 382/92 90 91 502 LD> GATE: 93:9600/0.0@Podnet 2e3b7769 LD> # Origin: PODNet <-> FidoNet EchoGate! (93:9600/0.0) LD> GPTH: 9600/0 382/7 9600/0 LD> GATE: 1:382/502.0@fidonet 2e410916 LD> * Origin: FidoNet <-> PODNet EchoGate! (1:382/502.0) LD> SEEN-BY: 19/34 374/1 5 14 26 48 98 382/29 41 44 77 90 91 92 502 804 LD> SEEN-BY: 382/8000 396/1 800/857 2200/101 3615/50 51 LD> PATH: 382/502 91 90 92 3615/50 374/1 98 14 somebody is overgating this traffic. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: PGP 2.6 is LEGAL in Zone 1! So USE it! [grin] iQCVAgUBLkK5IssQPBL4miT5AQGilwP+LRXtN0YcB4EC3YT6oDXUNk9HMGY5XsCl P41weh9lO2/3GkuAPV4PPHhteFf7MAfI6luxuyO4tH8fkR/RGMQQdR0ddPsq18/F ssPvSHEtzfSD+jhLJXDElDbVx4o5149O9ZuWUzj4BIfoci+hjGUDNK3/0xiDQ0/M 4tid2OAj4dg= =I8HW -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Todd Rourke 5 Aug 94 18:13:24 Subject: Re: Re: SecureMail Host Routing system info -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 04 Aug 94, Todd Rourke was quoted as saying: TR> There are no SMH's under me at this point in time. I serve as RSMH TR> and default NSMH for the entire R16. are you actively recruiting in your Region? TR> lost in the shuffle somewhere. let Jim Cannell know over in the SECUREMAIL Echo. he's doing the map. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: PGP 2.6 is LEGAL in Zone 1! So USE it! [grin] iQCVAgUBLkK5d8sQPBL4miT5AQGoCQQAo18ZGu7Erz/9J/9LOZXNcBMQiAEJdsLb cdT5wMmW18YSqbRwkvtY4F2ef0+gesaigesi2Ssxq2YGiOFBx5/+pmmmjDo3jPeT sAJiOjRtp60D8K3aNw43OCctpHSgBW498S1GgfydSTorzsHxvAhxY+gyZ0C+ocR2 r8Ne7lIr/LU= =W7j0 -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Steve T. Gove Area: Public Key Encryption To: Everyone 5 Aug 94 15:32:30 Subject: PGP in Net 106 Ok, so you're dying to know (actually so are we...) if Net 106 is filtering all the echos for PGP messages. WELL, here's what we can all do to see! I happen to know the moderator of the UNIX echo. His name is Lawernce Garvin. He DOES allow clear signed messages in his echo. And guess what...he's a net 106 sysop. His address is 106/6018. So someone, please send a clear signed PGP message in the UNIX echo (preferrably on topic) and also send the same message direct to him so he can look for it. If we are able to confirm that net 106 is filtering PGP messages, well then let the PC's fly at the NEC/NC etc. The NC is Scott Royall at 106/0 and 106/357. The NEC is Lefty Frizzell at 106/449. Have fun... -steve 1:106/6 gove@sccsi.com 201434369420143436942014343694201434369420143436942014343694718 From: Matthew Carey Area: Public Key Encryption To: Rand Wacker 26 Jul 94 12:39:56 Subject: New ITAR Indictment 19 Jul 94 09:36:08 Rand Wacker to Ian Hebert "New ITAR Indictment" ----------------------------------- RW> -----BEGIN PGP SIGNED MESSAGE----- RW> Ian Hebert said this: IH>Reprinted with permission from the Chicago Sun-Tribune, 5 July 1994: IH>From Sun-Tribune Wires IH>Washington, D.C.- IH> In a Rose Garden press conference early this morning, Justice IH>Department spokesmen announced the indictment of a Washington, DC. IH>computer bulletin board system (BBS) operator, one Mr. Gil Bates, for ^^^^^^^^^^^^^ IH>violation of ITAR munitions export laws in connection with the IH>operation of the infamous 'We got yer nudes here' BBS. RW> Just click your heels together and say three time, "It's only RW> a joke...I hope." There's your clue right there. RW> This is the scariest thing I've read in a long time. If it were true yes. As it's not true, you can either check yourself for having fallen for it or clap your hands in celebration of the pranksters among us. Or both. ... "You'll all be eating roach crap by the turn of the century!" 201434369420143436942014343694201434369420143436942014343694718