From: Shawn K. Quinn Area: Public Key Encryption To: Jim Cannell 13 Aug 94 18:13:02 Subject: Net 106 censorship? -----BEGIN PGP SIGNED MESSAGE----- *** Quote: Jim Cannell to Mike Lenker on 09 Aug 94 02:52:26 *** Subject: Net 106 censorship? JC> Don't let the control phreaks run FidoNet. AMEN! Let the control phreaks start and run ControlPhreakNet or something! SKQ -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLk1TdzzG+cClnFb5AQFVQgQAooRbvqOr0E7GQ5P/jdSBQPxr4hP/uFHP Et1uZ9Xjh1HptivmrWCryC5OOIpWqP11mSbk3bnVfSH4OvRtRd7pr+jk41R48rf4 reolrPZGnbEg7mZzF/4fdp7VpzFnLNs75E7/fLiplZiwW/Oyye6guJNPVfyEQlrF dp+TVYBzAP0= =oLkF -----END PGP SIGNATURE----- ... Tagline fever is the primary symptom of the Blue Wave epidemic!! 201434369420143436942014343694201434369420143436942014343694718 From: Shawn K. Quinn Area: Public Key Encryption To: Tim Devore 13 Aug 94 18:20:40 Subject: PGP & Point Software -----BEGIN PGP SIGNED MESSAGE----- *** Quote: Tim Devore to Tim Bradley on 11 Aug 94 23:51:38 *** Subject: PGP & Point Software TD> How are you getting your messages signed like this. I've tried and TD> wasn't able to figure it out and can't locate what I need in the TD> numerous doc files. I want the actual commands. It goes like this: PGP -sta +clearsig=on This will produce a file with an extention of .ASC with the same base name. SKQ -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLk1VQzzG+cClnFb5AQEICwP7Bk/qBaU0e3RgqExvXk5GjVZKGnZAX4Vi soqASR0oNoGLFwpaH2CBo3DhCXPNfwv4Ncw5zZOr7E9Tq1gPjCNBcmMaiMDPCyoe VxmslLmhifQ0d+1ZnMWDzNlgRw75D/kaZjHZ4CXuaTtBP0DXrZ2EqFyEsx5C1jDh jjksWMBdvac= =8WBd -----END PGP SIGNATURE----- ... Research shows that nine out of ten men who try camels...prefer women. 201434369420143436942014343694201434369420143436942014343694718 From: Peter Coffin Area: Public Key Encryption To: Christopher Baker 15 Aug 94 20:29:14 Subject: More Pgp Hoaxing Discussing More Pgp Hoaxing with All, Christopher Baker remarked: [...] CB> i will obtain and post this real key with my signature on it after he CB> studies the docs and generates one. CB> CB> TTFN. Chris p.s. we have a long-time, passworded link in addition to CB> voice verification. C. [...] Good to hear. I'm sure that even the people that enjoy poking at Steve would appreciate being able to know at whom they are really poking.... (: 201434369420143436942014343694201434369420143436942014343694718 From: Tim Devore Area: Public Key Encryption To: All 18 Aug 94 04:15:10 Subject: Key Key -----BEGIN PGP SIGNED MESSAGE----- I have two keys and would like to know how to get both keys extracted into one file instead of extracting them sperately into their own files. This is a test to see if the clearsig stuff works for me so you won't be able to verify my sig until I post my key, sorry still testing things out. Tim Devore, Amiga Library-Op, Co-Sysop of Realm of Thought -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: If you don't know the contents then don't claim responsibility for it iQB1AgUBLlNekym3EZ/ddX6dAQEd5AL/YV7w1VHyafUsxV6KhniMpzOviVb8zDXH pqKgbt/ZPt3CKFj2Mm37G21HqPLb42/gz6Z7U4Cy6ferwuKJffWl4rMzouPYxGCM IzFqQh7NwpB4/zkAbfFBUiDA9CkRXj2P =o89A -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Dan Booth Area: Public Key Encryption To: Kevin Lo 18 Aug 94 19:35:00 Subject: Re: Dallas Area Or Internet --> Dan Booth Quotes a message written by Kevin Lo --> to Dan Booth on 08-15-94 9:12 saying: KL> Greetings Dan, KL> KL> -=-= On 12 Aug 94 at 22:06, you wrote to All =-=- KL> KL> DB> Hi I'm trying to locate the file PGP26.zip either in the KL> area KL> DB> or somewhere on the Internet? Any help would be apprecia KL> in KL> DB> advanced. KL> KL> The 'official' release site of PGP is net-dist.mit.edu in the KL> directory. KL> KL> KL> Kevin LoInternet: dt194@nextsun.ins.cwru.eduFreq' K KL> FDC MerlinFidoNet: 1:374/98.5 (Palm Bay, Fl)@1:374/98 KL> KL> KL> ... Fartvergnugen.. the pleasure of breaking wind. KL> KL> (1:374/98.5) KL> Thanks....I got it. 201434369420143436942014343694201434369420143436942014343694718 From: Dan Booth Area: Public Key Encryption To: Dale Hopkins 18 Aug 94 19:36:00 Subject: Dallas Area Or Internet --> Dan Booth Quotes a message written by Dale Hopkins --> to Dan Booth on 08-18-94 12:57 saying: DH> DB> Hi I'm trying to locate the file PGP26.zip either in the DH> DB> Dallas, TX area or somewhere on the Internet? Any help DH> DB> would be appreciated....thanks in advanced. --- RoboBOARD/ DH> DB> 1.04 DH> DH> i'm sure you can get it on a local call from jason carr at DH> 1:124/3208. if not, try me 1:130/908. DH> DH> DH> ~djh~ DH> ... I've been locked inside your heart-shaped box for a week. DH> Thanks.... 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Jim Grubs 17 Aug 94 06:28:14 Subject: more PGP hoaxing -----BEGIN PGP SIGNED MESSAGE----- Saturday August 13 1994, Jim Grubs writes to Christopher Baker: JG> And his "forged" Fido Crucifixion article is being spread on Usenet signed JG> with the phoney key. (Via an anonymous remailer, of course.) How do we get JG> everyone to delete it? I've seen the signed article. I have yet to find a key that matches it. Is there a matching key for this article out there? You never know someone might have been stupid enough to sign it with their own key. Scott Clinton/Gore elected then Beavis & Butthead appear. Coincidence? Scott Mills 1024/26CD5D03 PGP fingerprint = 13 D6 FF 43 53 3D 54 7B 94 D0 6B F4 24 13 E5 BD sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6a iQCVAgUBLlG8byP6qSQmzV0DAQFsiQQAp37vQGqo6i9fbIJ+gRadxpPp0q6kPKYI HhK0ZmVf7CTaWMDGzgfFwn2e2yWIBQS92hSed8+pTtQkm/wrvDKLKFhBUG4M7mEk jzCFD8xize9b61Y1o4xmmRY3a01kmtzEo6fc9XWUIhIXURPFOCkJgdkvd1zy/MAL aUQePznZ524= =IgjG -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Tony Belding Area: Public Key Encryption To: Kevin Lo 17 Aug 94 21:38:44 Subject: -- Help -- KL> How do I get PGP to sign a a GoldED message, with high-ascii in it (my KL> box) without treating it as a binary file? I would suggest you avoid high ASCII if at all possible. Believe it or not, there are computers out here in the wide world that don't use the IBM PC character set! For example, your "box" looks rather ugly on my Amiga. 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Harry Bush 17 Aug 94 21:19:34 Subject: Re: Hi! -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 16 Aug 94, Harry Bush was quoted as saying: HB> This echo is now connected to Zone 2 Region 51 (Latvia) HB> via R51SMH 2:5100/8 and to Region 50 via R50SMH 2:5026/3 . glad to have you aboard! TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6a Comment: PGP 2.6 is LEGAL in Zone 1! So USE it! [grin] iQCVAgUBLlK3GssQPBL4miT5AQEyNAQAtiPFKZudne5pallUCKIr1pkv5LIJPGm3 1z5IY7hZtqC/EbLZs7L/2RDfkkMUUtSVNmCRPn/JeBmDXDPTk7aA1iIouBpceFQJ Vu01AkhXF/LH3mgBP0pQghjHWqT5Th7iEahFXhqwTu+dD6dmdcEaxkjmrMhHo2hM MIy626M/FjE= =tDFz -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Kevin Lo Area: Public Key Encryption To: Christopher Baker 15 Aug 94 20:39:02 Subject: -- Help -- Greetings Christopher, -=-= On 15 Aug 94 at 13:33, you wrote to Kevin Lo =-=- CB> why would you want to put high ASCII in Echomail? isn't that a no-no in CB> most Echos? Well, I haven't gotten any sort of complaints from anyone in any echos that I use, so I assume that nobody cares. Kevin LoInternet: dt194@nextsun.ins.cwru.eduFreq' KEVLO.ASC FDC MerlinFidoNet: 1:374/98.5 (Palm Bay, Fl)@1:374/98 - PGP Key ... *~*~* <-- Tribbled Waters 201434369420143436942014343694201434369420143436942014343694718 From: Kevin Lo Area: Public Key Encryption To: Ron Pritchett 18 Aug 94 14:11:06 Subject: Re: Pres/Vice Pres Greetings Ron, -=-= On 16 Aug 94 at 21:26, you wrote to All =-=- RP> For Example RP> key David Carter (1024/76271099 1993/07/05) RP> sig Albert Gore (DE09D78D 1994/08/12) RP> sig William J Clinton (23BDC6F9 1994/08/12) RP> key Phil Zimmerman (1024/C7A966DD 1993/05/21) RP> sig Albert Gore (DE09D78D 1994/08/12) RP> sig William J Clinton (23BDC6F9 1994/08/12) You have every right to be doubtful, since ANYONE could forge their name as being Gore or Clinton. :> Kevin LoInternet: dt194@nextsun.ins.cwru.eduFreq' KEVLO.ASC FDC MerlinFidoNet: 1:374/98.5 (Palm Bay, Fl)@1:374/98 - PGP Key ... Someone's got to kill all of those rumors. - Wesley 201434369420143436942014343694201434369420143436942014343694718 From: Mike Riddle Area: Public Key Encryption To: Tim Devore 18 Aug 94 06:56:58 Subject: Net 106 still at it? In a message to Scott Mills on Aug 15 94 at 23:19, Tim Devore wrote: TD> No it's not "against the law" for the sysop to review any TD> Net Mail. Find a copy of the Policy4 and read section 2 and TD> it will fill you in on alot of stuff. It might not be against policy, but in the U.S. you better check out the ECPA, and Steven Horn informs us there is similar legislation in Canda. The ECPA tells you when and how you may read netmail on your system and under what limited circumstances and to whom you may disclose your knowledge. "The contents of this message are intended as general legal information and should not form the basis for legal advice of any kind". 201434369420143436942014343694201434369420143436942014343694718 From: Mike Riddle Area: Public Key Encryption To: Ron Pritchett 18 Aug 94 07:00:18 Subject: Pres/Vice Pres In a message to All on Aug 16 94 at 21:26, Ron Pritchett wrote: RP> Do Clinton & Gore really have PGP keys? I'm importing the RP> latest batch of key from the internet server & I've seen at RP> least a dozen keys signed by "Albert Gore RP> " & "William J Clinton RP> " RP> *HOLY COW* I was just about to sign this msg & send it off RP> when the mother of all ironies just popped up in my other RP> OS/2 session: RP> key Phil Zimmerman (1024/C7A966DD 1993/05/21) RP> sig Albert Gore (DE09D78D 1994/08/12) RP> sig William J Clinton (23BDC6F9 1994/08/12) RP> highly doubtful, RP> Ron Highly doubtful, but remember the "web of trust." If a Clinton/Gore/Gone in four key comes your way, take a Really Careful Look at who has signed the keys! Mike 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Brad Stiles 19 Aug 94 08:14:44 Subject: Net 106 still at it? -----BEGIN PGP SIGNED MESSAGE----- Tuesday August 16 1994, Brad Stiles writes to Scott Mills: SM>> But to find that encrypted traffic the sysops must me reading all the SM>> "private" net mail that goes through their systems. I could have sworn SM>> that was against the law. BS> What law would that be violating? The Electronic Communications Privacy Act. I believe it makes reading private mail not addressed to you a crime. Scott A seminar on Time Travel will be held 2 weeks ago Scott Mills 1024/26CD5D03 PGP fingerprint = 13 D6 FF 43 53 3D 54 7B 94 D0 6B F4 24 13 E5 BD sm@f119.n265.z1.fidonet.org - --- -----BEGIN PGP SIGNATURE----- Version: 2.6a iQCVAgUBLlR4rCP6qSQmzV0DAQE/RAP/asz6c92hEm6heYMNUYJkPFeK2xZRPvIT iISVGJCuV9zGhZg4L8wpyQRlXXj8yS7yzpP0ZD6Kw5k1mb2nDxdX/7yGdO4N5kwH 8I/GBsv6Eq+4rpFiuk6S7BHXIejqjdnx3XGNRenp8yNSAYZXKfANCn8tU8CfMt/W VUe974Dsz7E= =VGbv -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: David Chessler Area: Public Key Encryption To: Kevin Lo 18 Aug 94 21:14:00 Subject: -- help -- -----BEGIN PGP SIGNED MESSAGE----- On 08-13-94 (15:57), Kevin Lo, in a message to All about "-- HELP --", stated the following: KL>How do I get PGP to sign a a GoldED message, with high-ascii in it (my >box) >without treating it as a binary file? I tried changing the charset to >ASCII, >cp850 (something like that) and alt_codes, and still nothing worked. I >tried: >'pgp +force -sta golded.msg' at the command line. Where is the +clearsig command? And why do you need +force? KL> > >Kevin LoInternet: dt194@nextsun.ins.cwru.eduFreq' >KEVLO.ASC >FDC MerlinFidoNet: 1:374/98.5 (Palm Bay, Fl)@1:374/98 - PGP >Key > > KL>... I know the Captain's orders -- Engage. Riker KL>--- GEcho 1.02+/FD 2.02 > * Origin: The Tower Of High Sorcery *Palm Bay, FL* >(1:374/98.5) ___ __ David.Chessler@f459.n109.z1.fidonet.org d_)--/d chessler@cap.gwu.edu chessler@trinitydc.edu -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLlQGp/thGmbTLbljAQFIKgP9EklE8gxnm8p6TSCwj5tId0rMJCCBPT8h OkJalbURuHxUSvuoYBWYQZ3pPlLzWKZ9Zwjc9KqSHOBcxDvRk/JSxNUipL4DKDKb 0QO2Ma+a1mJpjPonTw1N52sYqZxHuFSMNfDhJEf6vlYi2MIa7uT/sjuk33Fq/gbY tCo1zWGxxyc= =gXqO -----END PGP SIGNATURE----- * SLMR 2.1b * E-mail: ->132 1:109/459 david.chessler@neteast.com 201434369420143436942014343694201434369420143436942014343694718 From: Wes Landaker Area: Public Key Encryption To: Jason Levine 18 Aug 94 09:42:58 Subject: Quick inquiry... -----BEGIN PGP SIGNED MESSAGE----- Hello Jason! 15 Aug 94 23:13, Jason Levine wrote to Wes Landaker: JL> Does anyone know what form of cryptology DISKREET (Norton JL> Utilities) uses? I just realized that I've been using it JL> (on and off) for a few years, without having any idea JL> what kind of encryption scheme it uses... WL> It uses a (IMO) fairly weak DES method. I used to think it was WL> really hot st until I started getting into cryptography. =) JL> And to think I used to RELY on it...I didn't think JL> Norton would use DES. TTBOMK, it really is weak, compared to most JL> other methods. I used to use it _all_ the time, too. =) The only other encryption program I've seen that doesn't use DES (or something WEAKER) besides PGP was a small program called CRYPT that was a DOS filter. It used a one-time pad, which would have been good, except for the one-time pad was saved with the file, and only encrypted using your password that you entered. :) Kind of pointless, really--you break the password, and you've got the pad! Anyway, I've seen programs that will break Norton and all sorts of other programs, even when they are on "GOVERNMENT STANDARDS" (laugh) mode, which is just DES, usually only one pass with a small key. =) I was reading once in a magazine an article about a commersial program for cracking that stuff that supposedly is sold to people who have "forgot" their passwords, and whatever. The author said in the article (I'd quote the software and the author, but this was a while ago, and I for the life of me can't remember) that the program took about 30 seconds or less to break the weak encryption in almost all software packages, but they added a bunch of delays to make it seem like it was doing something hard. wjl [Team OS/2] * 1:202/1822@fidonet.org * 371:30/1@chnet.ftn * * wjl@f1822.n202.z1.fidonet.org * PGP Key: AD2254A5 * FREQ: PGPKEY * -----BEGIN PGP SIGNATURE----- Version: 2.6wjl iQCVAgUBLlOe8slPrmStIlSlAQFGBgP/dI5Fs1Q/J6f0NEiUglL4dVKcLd90bvM0 zVgKysOrmu5U8eclfiPomdGAUmYiXh7oG3Top570icDvZ8V+OmNLm7SBLmIRyThX zTPt8cRTAe+N8z7cWWgNuLE3VW9BUyBofrFHRvY/lNKJVcvjgu9j4XGKbi2IFEyH CRGddoxc654= =xEJY -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Wes Landaker Area: Public Key Encryption To: Tim Devore 18 Aug 94 09:49:38 Subject: Net 106 still at it? -----BEGIN PGP SIGNED MESSAGE----- Hello Tim! 15 Aug 94 23:19, Tim Devore wrote to Scott Mills: TD> No it's not "against the law" for the sysop to review any Net TD> Mail. Find a copy of the Policy4 and read section 2 and it will TD> fill you in on alot of stuff. Yes, in _some_ cases, it's okay for the sysop to review netmail, but not in all cases covered by Policy4. Just remember, Policy4 isn't above the law. :) wjl [Team OS/2] * 1:202/1822@fidonet.org * 371:30/1@chnet.ftn * * wjl@f1822.n202.z1.fidonet.org * PGP Key: AD2254A5 * FREQ: PGPKEY * -----BEGIN PGP SIGNATURE----- Version: 2.6wjl iQCVAgUBLlOfZ8lPrmStIlSlAQEVigP/Umw8rosiEAjpHK4kqW6nz5WS4drXePbH N+sSVCMoPwrgDafHOn+E4DhGxEirlqPOg+urSm5L6W33v6Obog3rZ3hC1Yr1ZnnR XpFdC3aO9PdQ6ITinj9XOzsS8jwl1KpN+evDO7+vm0kOIYQMMJhh5syOy9PXz3Fa hdTK/njwly0= =dCCF -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Wes Landaker Area: Public Key Encryption To: Ron Pritchett 18 Aug 94 09:51:40 Subject: Pres/Vice Pres -----BEGIN PGP SIGNED MESSAGE----- Hello Ron! 16 Aug 94 21:26, Ron Pritchett wrote to All: RP> Do Clinton & Gore really have PGP keys? I'm importing the latest RP> batch of key from the internet server & I've seen at least a RP> dozen keys signed by "Albert Gore RP> " & "William J Clinton RP> " RP> *HOLY COW* I was just about to sign this msg & send it off when RP> the mother of all ironies just popped up in my other OS/2 RP> session: RP> key Phil Zimmerman (1024/C7A966DD 1993/05/21) RP> sig Albert Gore (DE09D78D 1994/08/12) RP> sig William J Clinton (23BDC6F9 1994/08/12) RP> highly doubtful, Well even if we know that they are total farces (which we don't, but we are pretty sure ;) it doesn't really matter if they sign Phil's key or not--Phil has enough good signatures of his own. It's not like Phil signed THEIR keys! wjl [Team OS/2] * 1:202/1822@fidonet.org * 371:30/1@chnet.ftn * * wjl@f1822.n202.z1.fidonet.org * PGP Key: AD2254A5 * FREQ: PGPKEY * -----BEGIN PGP SIGNATURE----- Version: 2.6wjl iQCVAgUBLlOgCMlPrmStIlSlAQGt7AP+KL0SVMA7lBO9iHYxzHH0CLkseXQI4IdB qyFNY2MO1D4pIk9s+MzRsKrHG+7Ddu1R8YCKOx2YOMSA1P6FfseoIpyp+BQ7NM48 g2ONV9rLjG/rHEtnwsytvb4PSzPRtuufmq2Jtzsl+owShI1vfXPy06kFuXQrc1mU Im7UdNRn+fw= =G24V -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Tim Bradley Area: Public Key Encryption To: Brian McMurry 19 Aug 94 21:29:42 Subject: Re: PGP & Point Software -----BEGIN PGP SIGNED MESSAGE----- - -> Spot v?.?? seems to be the point software of choice for both PGP - -> proponants and the anonynous hordes alike. There are a good - -> number of PGP integraters avail for it (though I don't carry any - -> here). Remarkably enough, Spot's what I'm trying to get set up with (The problems lying not with Spot, but my tentative feed ... who I haven't heard from for about a week and a half). Do you have any "program" names that you're aware of? I can find things without TOO much difficulty if I know exactly what to look for . Later Daze! -- Tim Bradley -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: I am Locutus of the NSA: Privacy is irrelevant iQBVAgUBLHRvNTDp94PCS+V9AQHRagH/cGzigGZxyfQaTvf2l31uKeBxM5ULnxJl Y0ctbfhyugiOO647urwaGYVbzkqvv1xIlgunRQoAjZAKtNlmxWmHaQ== =SMuS -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Jess Williams Area: Public Key Encryption To: All 18 Aug 94 23:52:30 Subject: WHERE TO FIND 26UIX Hello, I am looking for the SOURCE CODE for pgp26uix I need to find a bbs that will let me download it on my first call preferably (I live in hawaii and long distance gets expensive) I tried Hyroglyphic Voodoo Machine and I couldn't find it there. It has to be a bbs because I dont have FTP access with my internet acct. Any help would be appreciated. Thanks a Lot Jess Williams 201434369420143436942014343694201434369420143436942014343694718 From: Jim Grubs Area: Public Key Encryption To: Lloyd Warren 16 Aug 94 17:25:02 Subject: Pkey_drop > LW> Do you echo to and/or retrieve from any Internet sites reachable > LW> via anonymous ftp? > no. but keys posted there do end up on the Internet servers. I forward everything that shows up here to fbihh.informatik.uni-hamburg.de. I don't trust the American keyservers -- particularly MIT's. Sincerely, Jim Grubs 201434369420143436942014343694201434369420143436942014343694718 From: John Schofield Area: Public Key Encryption To: George Hannah 19 Aug 94 14:29:24 Subject: Re: Remailer -----BEGIN PGP SIGNED MESSAGE----- --====-- GH> John, I would like to beta test such a program. Please netmail me GH> when the beta version is available. Will do, George. JMS -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: Call +1-818-345-8640 for information on Keep Out iQCVAgUBLlUQVWj9fvT+ukJdAQE8sAP6A1KFN5KqIcRiVqgtsrvMLyPfThofmaP8 mD3Frocl5PLxbI+63w/Ehxt/tvmL/bL37Wjc5CpuPextafVhyVMa/r81jqhWFxiS aLn1v+I2Zfe76kME6G+Ex6ZBFLH4LCQg6/Bl8VATuA7LcVOEeTrY8RgkS8QRXNVZ +968cnDM9ZE= =O5qv -----END PGP SIGNATURE----- **EZ-PGP v1.07 ... There is nothing so permanent as a temporary government program. 201434369420143436942014343694201434369420143436942014343694718 From: Dale Hopkins Area: Public Key Encryption To: jason carr 20 Aug 94 11:39:12 Subject: Re: Net 106 still at it? jc> I appreciate your generosity, and willingness to help jc> distribution. This net needs more sysops with those jc> qualities. :) DH> this net? you mean 124 and by extension 130? then what am jc> Fido. bark bark bark DH> i spending money moving your echo back and forth for? DH> consider yourself dissed! jc> Hey, I've got a female companion that does that already. jc> You'll hafta que up if you wanna diss =me=... you've got a female companion who disses you, or who moves your echo back and forth, or both? ;} DH> spoken by someone who lives in the very imaginary paradise DH> of Irving, TX? jc> Hey, I just sleep here. Sometimes. hah. you latte there, i bet. at home, too. >> i'd say you owe me another latte, if not an DH> entire french country picnic, handmade...... jc> What all is involved in a FC picnic? Good wine and a bad jc> attitude towards passersby? We can relax on the grass and jc> I'll read to you from the PGP docs, part 2 (technical jc> reference). You can run... an FC picnic consists of excellent and authentic food and wine, and sub-deficient authentic attitude, the first item hand-made or hand-selected by =you=. outside, on the grass. whether i stay for the =reading-of-the-docs= depends on the quality of the wine. (or whine.....) jc> --- CALLQ.BAT It's ugly, but it works! does it resemble it's master, like a =good= pet? ~djh~ ... i was lost in the supermarket. i could no longer shop naturally 201434369420143436942014343694201434369420143436942014343694718 From: Brad Stiles Area: Public Key Encryption To: Rich Veraa 20 Aug 94 16:35:00 Subject: Net 106 still at it? Hello Rich! BS>> What law would that be violating? RV> The Electronic Communications Privacy Act, 18 USC 2510-3127. Thanks. I appreciate the response. After I sent that, I wondered if it would be interpereted as the serious request for information that it was, or as a challenge because of my poor wording. Thanks for not jumping down my throat. Brad +++ PGP public key available - FReq PUBLIC_KEY 201434369420143436942014343694201434369420143436942014343694718 From: Joe Lemere Area: Public Key Encryption To: All 16 Aug 94 11:47:50 Subject: Keys -----BEGIN PGP SIGNED MESSAGE----- Greets All! I believe I have a handle on PGP now, thanks to this echo. Below you should see my sig . . . Let me know if I bollixed up the workings somewhere. ;-) Joe Lemere -----BEGIN PGP SIGNATURE----- Version: 2.6a iQCVAgUBLlDfjoKVyV6dLYxZAQFKUgP9HNXQ+AeOiWleWDIfio1d1CcogZOsgXCJ dcDsBLnDrMhbKh290wX9pkVBScTJOREiWbiCNRck6HcHNgjk/HcoUDfR+V2/rn5F up9vM+956Ur4WthQHeIzjNXP6GvpcBzLriRTQTq8HajsEPeyUnyM+5L951ksIheV jMY8gwyYW+o= =sXUE -----END PGP SIGNATURE----- ~~~ PGPBLUE/2 2.5 ... Eagles May Soar, But Weasles Arn't Sucked Into Jets 201434369420143436942014343694201434369420143436942014343694718 From: David Chessler Area: Public Key Encryption To: Ron Pritchett 19 Aug 94 19:35:00 Subject: Pres/vice pres On 08-16-94 (21:26), Ron Pritchett, in a message to All about "PRES/VICE PRES", stated the following: RP>-----BEGIN PGP SIGNED MESSAGE----- RP>Do Clinton & Gore really have PGP keys? I'm importing the latest batch No. >of key from the internet server & I've seen at least a dozen keys >signed by "Albert Gore " & "William J >Clinton " Some turkey put a bunch of spoof keys into the MIT keyserver. RP>*HOLY COW* I was just about to sign this msg & send it off when the >mother of all ironies just popped up in my other OS/2 session: RP>key Phil Zimmerman (1024/C7A966DD 1993/05/21) >sig Albert Gore (DE09D78D 1994/08/12) >sig William J Clinton (23BDC6F9 1994/08/12) RP>highly doubtful, as you should be. There was a long message in the internet newsgroups two days ago. the turkey also signed about 40 keys, including most of the principals in PGP, with his faked government keys. What is worse, there is no way of removing a fake signature from a key once it's in the keyserver (except to remove the key and replace it with a backup copy). The next version of PGP will almost certainly have a -krs command, to remove or even revoke a signature. ___ __ David.Chessler@f459.n109.z1.fidonet.org d_)--/d chessler@cap.gwu.edu chessler@trinitydc.edu * SLMR 2.1b * E-mail: ->132 1:109/459 david.chessler@neteast.com 201434369420143436942014343694201434369420143436942014343694718 From: Rich Veraa Area: Public Key Encryption To: Shawn Mcmahon 16 Aug 94 11:08:20 Subject: New to PGP -----BEGIN PGP SIGNED MESSAGE----- In a message dated:11 Aug 94, Shawn Mcmahon was quoted as saying: SM> Jason, it'd be polite to send netmail asking if you could post ANYTHING SM> in an echo before you ever post it. SM> It'd also be quite silly. Why? Every echo has different standards of what is and is not acceptable. It behooves a newbie to find out ahead of time. SM> That can't, and SHOULDN'T, be done through Policy. The only way it'll SM> ever happen is if a large number of people start routinely signing their SM> messages. I don't think that'd be wise. If one persion tests the waters from time to time, you can keep the subject alive.. but if several people start using them, you'll just make Moderators mad and they'll write rules against them if they haven't already. I'm a supporter of PGP, but don't allow clear-signing on WRITING, along with internet-type sig blocks or other space-users. They're just not necessary there. Cheers, Rich -----BEGIN PGP SIGNATURE----- Version: 2.6rv Comment: rveraa@newssun.med.miami.edu iQCVAgUBLlCsLZ80iJ+tnwVVAQG7lgP/ZBOoGevddqkESt3iolXjq4w6RDlbBvs1 F3qNgvX+5pe+JY96DQwscWLarCZjFOAM5RmzrlLASiXJEzB1YcWlAfvU44lsGTei CVphXeHIsPrz3/PeIJ9i51rHwRCgn9VsyGQmEJBGBFtfNYK9BQYm7YTPiHUFapx8 C1z9gY5XZko= =nYxn -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Rich Veraa Area: Public Key Encryption To: Tim Devore 18 Aug 94 10:03:58 Subject: Re: Net 106 still at it? -----BEGIN PGP SIGNED MESSAGE----- In a message dated:15 Aug 94, Tim Devore was quoted as saying: TD> SM> But to find that encrypted traffic the sysops must me reading all TD> SM> the "private" net mail that goes through their systems. I could TD> SM> have sworn that was against the law. TD> No it's not "against the law" for the sysop to review any Net Mail. TD> Find a copy of the Policy4 and read section 2 and it will fill you TD> in on alot of stuff. Nope.. Pol 4 was written prior to the Federal Electronic Communications Privacy Act. It's now illegal. Cheers, Rich -----BEGIN PGP SIGNATURE----- Version: 2.6rv Comment: rveraa@newssun.med.miami.edu iQCVAgUBLlNAF580iJ+tnwVVAQHGQwQAgrZRfbr3IZ3GzfLEQw0rhZl86dBAMGra 6OckgalEuQbrdbSELR92rw5e+ULt2qlAYqsax2Oa2b7dUgRL8t359kKd9cNxjpiU NKJohPZpraIwF+gkX+5rlJsbsHf6EtWzCBw26V5HtfidvWBuhvOAGvB/YhWzRJr7 5EVEEmh7mfw= =pTBj -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Rich Veraa Area: Public Key Encryption To: Brad Stiles 18 Aug 94 10:11:38 Subject: Re: Net 106 still at it? -----BEGIN PGP SIGNED MESSAGE----- In a message dated:16 Aug 94, Brad Stiles was quoted as saying: BS> SM> But to find that encrypted traffic the sysops must me reading all BS> SM> the "private" net mail that goes through their systems. I could RS> SM> have sworn that was against the law. BS> What law would that be violating? The Electronic Communications Privacy Act, 18 USC 2510-3127. Cheers, Rich -----BEGIN PGP SIGNATURE----- Version: 2.6rv Comment: rveraa@newssun.med.miami.edu iQCVAgUBLlNB4580iJ+tnwVVAQHG3AP7B4UduCOjKY2UAMqAO59iMQIkPR9j8L7E UK5+ATOsWGcqI+xS5TK1ZgvGRL5CfiG7Fr4oXd0bl0JOOVVXeeQlkMJuXJeM4H7P RF4fTbT6AUbDqNpm7nJdGAGE9iU6BwGzkxxvtyM0hB9NH0SBiMsVCo8jPVFyp5KY pNvhRVnQiB8= =1nj0 -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Dale Hopkins 19 Aug 94 21:35:58 Subject: Re: Net 106 still at it? -----BEGIN PGP SIGNED MESSAGE----- Dale Hopkins wrote in a message to jason carr: jc> I appreciate your generosity, and willingness to help jc> distribution. This net needs more sysops with those jc> qualities. :) DH> this net? you mean 124 and by extension 130? then what am Fido. DH> i spending money moving your echo back and forth for? DH> consider yourself dissed! Hey, I've got a female companion that does that already. You'll hafta que up if you wanna diss =me=... DH> spoken by someone who lives in the very imaginary paradise DH> of Irving, TX? Hey, I just sleep here. Sometimes. >> i'd say you owe me another latte, if not an DH> entire french country picnic, handmade...... What all is involved in a FC picnic? Good wine and a bad attitude towards passersby? We can relax on the grass and I'll read to you from the PGP docs, part 2 (technical reference). You can run... jason ... I am here. Wish you were fine. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLlWJBkjhGzlN9lCZAQHpWgP+I/s9u4aUHcbhhvZu1AVQQ89BG7cWzwtc DTqxOD+PwwPNFjUpTFDdcq5cx1Cg+HmglDKmfFU3iunU0DlcS5MQ5FS9H71y+31B q3EjCycpXPlVKX1xaWRHGr4lQGbYd8RX7t7I4EUp9QjM2PYRiM425/ooXZwk1EuF WDkZXzBbFrI= =CnHg -----END PGP SIGNATURE----- ...Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Tim Devore 19 Aug 94 22:04:02 Subject: Net 106 still at it? -----BEGIN PGP SIGNED MESSAGE----- Tim Devore wrote in a message to Scott Mills: TD> No it's not "against the law" for the sysop to review any TD> Net Mail. Find a copy of the Policy4 and read section 2 and TD> it will fill you in on alot of stuff. If it were that black/white. The ECPA may come into play where the poster has a reasonable expectation of privacy. jason ... I AM NOT CONCEITED. I JUST HATE MORTALS. -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAgUBLlWPCUjhGzlN9lCZAQE8WQQAqwZiKDP/n+kqfgqZzKjZDsNlR91eWdeQ lLQoyCHbXBR4lpO8uQi3Gt3cNzWNH6vqIfUJmXniuy1cXOus8lBObZbSgZaJN+re ecwtraNL4CmelOkkPk6ZE0E4OkRR7sALK1uGZ6lDV3sLWXcqYpLhLHKdXMQ0bbBv yxQ2hUnUGAg= =5aXr -----END PGP SIGNATURE----- ...Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Dan Booth 19 Aug 94 22:08:00 Subject: Re: Dallas Area Or Internet following up a message from Kevin Lo to Dan Booth: DB> Hi I'm trying to locate the file PGP26.zip either in the Dallas, TX area DB> or somewhere on the Internet? Any help would be appreciated....thanks in DB> advanced. It's FREQable and d-loadable from my bbs (below) on the first call. jason ... Oh, you ALWAYS get to be Jesus. 201434369420143436942014343694201434369420143436942014343694718 From: Brian McMurry Area: Public Key Encryption To: Randy Edwards 18 Aug 94 15:54:56 Subject: Re: Epic Seeks Wiretap Data They [FBI] are just upset that Kevin Poulsen was able contemptuously call and laugh at them while they were unable to trace his call. It probably breaks down that there were 81 court-approved cases and 100 un-approved [illegal] cases in which they were unable to sercure a tap. 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Wes Landaker 21 Aug 94 17:10:58 Subject: Net 106 still at it? Despite the stern warnings of the tribal elders, Wes Landaker said this to Tim Devore: WL> Yes, in _some_ cases, it's okay for the sysop to review netmail, WL> but not in all cases covered by Policy4. Just remember, WL> Policy4 isn't above the law. :) Additionally, Policy4 restricts you from revealing the contents of netmail that isn't addressed to you, no matter what the reason, unless the sender or addressee gives you permission. This means that, if some NC wants to file a PC against you for sending somebody in his net signed mail, he must violate P4 to even file it. 201434369420143436942014343694201434369420143436942014343694718