Cryptography-Digest Digest #672, Volume #11 Sun, 30 Apr 00 16:13:01 EDT
Contents:
Re: Tempest Attacks with EMF Radiation (Guy Macon)
Re: factor large composite ([EMAIL PROTECTED])
Re: 40 Cryptography books reviewed ("John A. Malley")
Re: Tempest Attacks with EMF Radiation ("Trevor L. Jackson, III")
Re: Tempest Attacks with EMF Radiation (Richard Heathfield)
Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net" (JimD)
Re: Tempest Attacks with EMF Radiation (JimD)
Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net"
(Therion Ware)
Re: Can a password be to long? (Johnny Bravo)
Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net"
("PJS")
Re: new Echelon article (Diet NSA)
Re: How would a 15 year old start? (Andy Dingley)
Re: How would a 15 year old start? (Andy Dingley)
Interleaving for block encryption (Mok-Kong Shen)
Re: new Echelon article (Richard Heathfield)
Re: 40 Cryptography books reviewed (David Youd)
Re: Of Mountains and Molehills (Mok-Kong Shen)
Diff analysis, I will get it sooner or later (Tom St Denis)
Re: Diff analysis, I will get it sooner or later (Tom St Denis)
Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net"
(George Edwards)
Re: How would a 15 year old start? (mindlag)
Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net"
(George Edwards)
----------------------------------------------------------------------------
From: [EMAIL PROTECTED] (Guy Macon)
Subject: Re: Tempest Attacks with EMF Radiation
Date: 30 Apr 2000 13:10:24 EDT
In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
(Mok-Kong Shen) wrote:
>Marginally on-topic: Let's hope that no fundamentalists
>would step into the scientific field of crypto, lest there
>would be a holy cipher and all other algorithms would be
>condemned to the eternal fire of the hell.
That's not how it would happen. They would claim that ROT13
is an unbreakable cypher and that anyone who says different
does so because they hate God.
------------------------------
From: [EMAIL PROTECTED]
Subject: Re: factor large composite
Date: 30 Apr 2000 12:48:51 -0400
In article <[EMAIL PROTECTED]>, Tom St Denis <[EMAIL PROTECTED]> writes:
>[EMAIL PROTECTED] wrote:
...
>> >> The number is question is (2^773)+1, and it does
>> >> indeed have [no fewer than] 773-bits, with 773 > 768.
...
>What are you using to factor it?
Hi Tom. The "special" number field sieve with polynomials
X^6+2 and X-m, with common root m = 2^129 (mod n), n = 2^773+1.
For contrast, the "general" number field sieve factorization of
RSA-155 used polynomials
119377138320*X^5 + c_4*X^4 + ... + c_1*X + c_0 and X-m,
where c_4 has 17-digits (decimal), c_3 has 20-digits, c_2 26-digits,
c_1 28 and c_0 32-digits and the common root "m" (mod RSA-155) has
29-digits. I happen to like this particular polynomial, the one with
lots of large coefficients, since it was found here at Lehigh following
a suggestion from Arjen. If I recall my lecture over in EECS correctly,
there are 56 algebraic primes dividing the 25 (rational) primes less
than 100 ... far more than the c. 25 one would expect. With the
Quadratic Sieve one gets only the usual 25 primes less than 100; for
RSA-155 with this gnfs polynomial, we got to use 56+25 primes "less"
than 100.
Details of our previous SNFS record, with 211-digits, can be found
on Scott Contini's site at http://www.maths.usyd.edu.au:8000/u/contini/
factoring/FactorAnnouncements.html. Likewise for details on RSA-140
and RSA-155, including the coefficients omitted above.
B. Dodson
------------------------------
From: "John A. Malley" <[EMAIL PROTECTED]>
Subject: Re: 40 Cryptography books reviewed
Date: Sun, 30 Apr 2000 10:42:27 -0700
That's a good list. Are you open to including crypto-reviews from other
readers/posters to this USENET group? (Or suggestions of books for you
to read and review when you get the chance?)
For example, I'd recommend Decrypted Secrets by F.L.Bauer, a history of
and exposition on cryptanalysis. And the Military Cryptanalysis series
by William Friedman available from Aegean Park Press.
John A. Malley
[EMAIL PROTECTED]
David Youd wrote:
>
> Check out reviews of 40 cryptography books (plus an additional 10 not
> yet reviewed) at:
> http://www.youdzone.com/cryptobooks.html
------------------------------
Date: Sun, 30 Apr 2000 14:09:32 -0400
From: "Trevor L. Jackson, III" <[EMAIL PROTECTED]>
Subject: Re: Tempest Attacks with EMF Radiation
Mok-Kong Shen wrote:
> Ryan Phillips wrote:
>
> > I made my journey today to a local computer store and came across a device
> > called X-ion (www.x-ion.org). They claim that their little stick on
> > 'modules' will reduce EMF radiation by reversing the ion particles found in
> > EMF. Can one place these on their monitor to prevent a tempest attack?
>
> My hardware knowledge is almost null. I conjecture, however,
> that the article 'Wanna jam it?' in NewScientist, 22 April,
> p.11, may be of some interest to you though it seems to be only indirectly
> related to your issue.
>
> M. K. Shen
>
> ----------------------------
> P.S.
> Off-topic for the group: The same issue of NewScientist also
> contains a number of interesting articles on creationism.
> Marginally on-topic: Let's hope that no fundamentalists
> would step into the scientific field of crypto, lest there
> would be a holy cipher and all other algorithms would be
> condemned to the eternal fire of the hell.
There nothing in the title of your post that suggests your message is related to
the AES selection process.
------------------------------
Date: Sun, 30 Apr 2000 19:15:47 +0100
From: Richard Heathfield <[EMAIL PROTECTED]>
Subject: Re: Tempest Attacks with EMF Radiation
Guy Macon wrote:
>
> In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
> (Mok-Kong Shen) wrote:
>
> >Marginally on-topic: Let's hope that no fundamentalists
> >would step into the scientific field of crypto, lest there
> >would be a holy cipher and all other algorithms would be
> >condemned to the eternal fire of the hell.
>
> That's not how it would happen. They would claim that ROT13
> is an unbreakable cypher and that anyone who says different
> does so because they hate God.
Ner lbh fhttrfgvat fbzrbar penpxrq EBG13? Pbzcyrgr abafrafr. Lbh'er
boivbhfyl na vasvqry.
:-)
--
Richard Heathfield
"Usenet is a strange place." - Dennis M Ritchie, 29 July 1999.
C FAQ: http://www.eskimo.com/~scs/C-faq/top.html
34 K&R Answers: http://users.powernet.co.uk/eton/kandr2/index.html (63
to go)
------------------------------
From: [EMAIL PROTECTED] (JimD)
Crossposted-To:
uk.media.newspapers,uk.legal,alt.security.pgp,alt.privacy,uk.politics.parliament,uk.politics.crime,talk.politics.crypto,alt.ph.uk,alt.conspiracy.spy,alt.politics.uk
Subject: Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net"
Reply-To: JimD
Date: Sun, 30 Apr 2000 17:22:33 GMT
On Sun, 30 Apr 2000 10:24:47 +0100, "NoSpam" <[EMAIL PROTECTED]> wrote:
>http://www.sunday-times.co.uk/news/pages/sti/2000/04/30/stinwenws01034.html
>
>MI5 builds new centre to read e-mails on the net
>
>Nicholas Rufford
>
>
>MI5 is building a new �25m e-mail surveillance centre that will have the
>power to monitor all e-mails and internet messages sent and received in
>Britain. The government is to require internet service providers, such as
>Freeserve and AOL, to have "hardwire" links to the new computer facility so
>that messages can be traced across the internet.
=============%<=============
All the more reason to use PGP.
Stuff the Security Services! (so-called MI5).
--
Jim Dunnett.
g4rga at thersgb.net
Londoner? Vote for Ken!!
------------------------------
From: [EMAIL PROTECTED] (JimD)
Subject: Re: Tempest Attacks with EMF Radiation
Reply-To: JimD
Date: Sun, 30 Apr 2000 17:22:34 GMT
On 30 Apr 2000 01:33:37 EDT, [EMAIL PROTECTED] (Guy Macon) wrote:
>In article <[EMAIL PROTECTED]>, [EMAIL PROTECTED] (Ryan
>Phillips) wrote:
>>
>>I made my journey today to a local computer store and came across a device
>>called X-ion (www.x-ion.org). They claim that their little stick on
>>'modules' will reduce EMF radiation by reversing the ion particles found in
>>EMF. Can one place these on their monitor to prevent a tempest attack?
>
>I am an Electrical Engineer who has designed products that passed tests
>for Tempest (which was interesting, considering that my security clearance
>at the time did not allow me to read the Tempest specification!).
>
>The device in question is a fraud, plain and simple. It will not have
>any effect on the amount of EMF or the amount of ions in the air.
>
>I would be glad to have a brief discussion about more effective measures,
>but to do so I need to know what kind of attacker you are trying to stop.
For my part I just wish the bloody monitor wouldn't interfere with
the radio.
While we're on the subject: does a TFT screen radiate?
--
Jim Dunnett.
g4rga at thersgb.net
Londoner? Vote for Ken!!
------------------------------
From: Therion Ware <[EMAIL PROTECTED]>
Crossposted-To:
uk.media.newspapers,uk.legal,alt.security.pgp,alt.privacy,uk.politics.parliament,uk.politics.crime,talk.politics.crypto,alt.ph.uk,alt.conspiracy.spy,alt.politics.uk
Subject: Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the
net"
Date: Sun, 30 Apr 2000 19:20:45 +0100
On Sun, 30 Apr 2000 15:04:07 +0100, Dave J <[EMAIL PROTECTED]> wrote
in uk.legal:
>On Sun, 30 Apr 2000 03:26:17 -0700, Hawke <[EMAIL PROTECTED]>
>wrote:
>
>>very interesting reading.
>>I can see where this is starting to become a trend.
>>What is with the governments of this planet these days?
>>they cannot even trust their own citizens?????
>>
>>sorry for the massive cross-post reply.
>>
>>Hawke
>>
>>
>>NoSpam wrote:
>>
>>
>>http://www.sunday-times.co.uk/news/pages/sti/2000/04/30/stinwenws01034
>>.html
>
>Would someone who knows the score (legal and otherwise) tell me about
>unseen problems with headerless encryption?
INAL! (But my auntie was the youngest woman barrister ever to
qualify!).
First I'd advise you read Phil's bit on PGP and his original
"unbreakable" code.
I presume what you mean by this is a file that doesn't announce itself
as an encrypted file.
It seems to me that the first question that would be asked is "why are
you sending random garbage to other people?" - while this isn't
uncommon on usenet, at least, a traffic analysis of your sending
patters may go far enough to establish that you're "probably" sending
encrypted stuff to other people.
If you really want to write a useful program, it would be one that
encodes the real message in another message - or in a picture -
probably using a mixture of public key and substitution as its basis.
the major problem, of course, is that should the boys in blue, or
indeed gray, find your program on your, or any, computer you would be
assumed, de facto, to have sent/received encrypted messages.
So perhaps the major problem is to hide the program, more than the
output. Several methods occur, but mostly involving very large
magnets.
>I believe the data part of a pgp file is indistinguishable from white
>noise so if the software was altered a little to encrypt the header as
>well the authorities couldn't tell the difference between your code and an
>analogue recording of white noise..?
>In my simple minded view I think that makes the legislation unworkable.
>Ok, so they can do you for not providing a key even if you don't have it
>but can they do you for a bunch of random numbers that isn't even
>demonstrably encrypted?
>
>I am currently learning C, partly with an eye to borrowing the PGP source
>code and altering the header generation. I am *sure* there must be snags I
>haven't thought of but as I'm usually taken as the local nutter I can't
>get a sensible reply..
>
>Anyone?
>
>Dave J.
--
"Do Unto Others As You Would Have Them Do Unto You."
- Attrib: Pauline Reage.
.......
HELL? <http://www.city-of-dis.co.uk/entry/hell.html>
--
Inexpensive video to mpeg-1 conversion? See: <http://www.video2cd.co.uk>
--
The alt.atheism twitlist. See: <http://www.twitlist.co.uk>
------------------------------
From: Johnny Bravo <[EMAIL PROTECTED]>
Subject: Re: Can a password be to long?
Date: Sun, 30 Apr 2000 14:15:35 -0400
On Sat, 29 Apr 2000 00:40:41 -0700, "Douglas de la Torre"
<[EMAIL PROTECTED]> wrote:
>Check out http://www.diceware.com . This is a perfect example of how you
>can use a passphrase composed of 'plain English' words, and yet get lots of
>security.
>
>Each word in a diceware passphrase adds 15 bits of security.
12.9 bits for Diceware words. A very good system for making up
mnemonics to memorize your passwords with.
--
Best Wishes,
Johnny Bravo
"The most merciful thing in the world, I think, is the inability
of the human mind to correlate all it's contents." - HPL
------------------------------
From: "PJS" <[EMAIL PROTECTED]>
Crossposted-To:
uk.media.newspapers,uk.legal,alt.security.pgp,alt.privacy,uk.politics.parliament,uk.politics.crime,talk.politics.crypto,alt.ph.uk,alt.conspiracy.spy,alt.politics.uk
Subject: Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net"
Date: Sun, 30 Apr 2000 19:35:04 +0100
----BEGIN PGP ENCRYPTED MESSAGE-----
qeiob2468hjktrgpaqe7y235gr[aekbatagf89pq34ha3490werhjgaser;kngaiop35nerg34q3
ty4opqtaj37w4hopit5
assassinatejackstrawbyputtingabombunderhiscar56wwrtoae59hkl1350bvfhk
450;hkler[ad;hkle[pa
=====END PGP ENCRYPTED MESSAGE=====
--
Will the last person to be eaten
by the Fnord please turn the light out?
------------------------------
Subject: Re: new Echelon article
From: Diet NSA <[EMAIL PROTECTED]>
Date: Sun, 30 Apr 2000 11:46:02 -0700
In article <[EMAIL PROTECTED]>, "Trevor L. Jackson, III"
<[EMAIL PROTECTED]> wrote:
>The count of exclamation points has reached the level that
indicates frothing at
>the mouth,
No, the exclamation points were meant to emphasize the sheer
enormity of your ignorance. As usual, you are incapable of real
debate, and you have avoided answering the questions I posed.
so let's refer to the National Socialists and call
this thread dead.
>
What the fuck does this [yet again] ridiculous statement mean?
Are you suggesting that I am some type of national socialist? It
was *you* who claimed that the Allies' victory against the Nazis
[a group of national socialists] was merely accidental. Your
claim implies that you do *not* consider national socialists to
be a significant threat. You and other similar
separatist/survivalist/anarchist-type nutcases are each a few
gunmen short of a militia, if you know what I mean!
" V hfdt afogx nfvw ufo axb (o)(o) " - Gtnjv
====================================================
* Sent from RemarQ http://www.remarq.com The Internet's Discussion Network *
The fastest and easiest way to search and participate in Usenet - Free!
------------------------------
From: Andy Dingley <[EMAIL PROTECTED]>
Subject: Re: How would a 15 year old start?
Date: Sun, 30 Apr 2000 19:47:15 +0100
"Trevor L. Jackson, III" <[EMAIL PROTECTED]> a �crit :
>It may be useful to reinspect your experience categorizing it with respect to
>symmetric versus asymmetric crypto. Asymmetric crypto is based on relatively
>esoteric mathematics (number theory). Symmetric crypto does not have the same
>level of prerequisite background in theoretical mathematics.
Fascinating point ! I'd never considered that aspect.
------------------------------
From: Andy Dingley <[EMAIL PROTECTED]>
Subject: Re: How would a 15 year old start?
Date: Sun, 30 Apr 2000 19:47:16 +0100
David A Molnar <[EMAIL PROTECTED]> a �crit :
>OK, let's add one more recommendation : _The Codebreakers_, by David Kahn.
Indeed - another essential book in the canon
Welchmann's "The Hut Six Story" is worth it too, if you happen across
a copy. Probably more technical than Kahn, but describing a very
smaller part of the picture (I'd like to read the Hut 2 and Hut 11
stories !)
>No one says you have to understand all of it on first reading.
I'm just concerned that someone enthusiastic but naive (in the bast
sense of the word) happens upon AppC, reads a chapter and then writes
the whole field off as too technical and too dry to be of interest.
(...they then take up VR graphics instead, write the next killer
game, but lose all their money owing to a bad-crypto problem with
their dongling.)
--
Smert' Spamionam
------------------------------
From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Interleaving for block encryption
Date: Sun, 30 Apr 2000 21:06:55 +0200
In channel encoding there is a technique for dealing
with burst bit errors named interleaving (or code
splicing). Analogously applied to block encryption
with a cipher of block size, say, 64 bits, this would
mean first to accumulate 64 blocks of plaintext and
then to take all first bits of the given blocks to
form one block as input to the cipher, then take all
second bits of the given blocks, and so on. This seems
to be beneficial to strength, since in bruteforcing the
opponent would need to tackle at least 64 blocks.
Previously I have proposed to use variable keys for block
ciphers. It appears that interleaving could be a valuable
supplement to using variable keys. For with the combination
the opponent would have to guess 64 keys right in order to
arrive at any plaintext. Of course, the regrouping of the
bits of the given plaintext costs processing time, but I
guess that this is tolerable if appropriate hardware as is
used in channel encoding is available.
M. K. Shen
=========================
http://home.t-online.de/home/mok-kong.shen
------------------------------
Date: Sun, 30 Apr 2000 20:04:39 +0100
From: Richard Heathfield <[EMAIL PROTECTED]>
Subject: Re: new Echelon article
Diet NSA wrote:
>
> In article <[EMAIL PROTECTED]>, "Trevor L. Jackson, III"
> <[EMAIL PROTECTED]> wrote:
>
> so let's refer to the National Socialists and call
> this thread dead.
> >
>
> What the fuck does this [yet again] ridiculous statement mean?
> Are you suggesting that I am some type of national socialist? It
> was *you* who claimed that the Allies' victory against the Nazis
> [a group of national socialists] was merely accidental. Your
> claim implies that you do *not* consider national socialists to
> be a significant threat. You and other similar
> separatist/survivalist/anarchist-type nutcases are each a few
> gunmen short of a militia, if you know what I mean!
That worked beautifully. I suggest that Diet NSA greps the Jargon File
for "Godwin's Law". Jargon file at http://www.tuxedo.org/~esr/jargon/
--
Richard Heathfield
"Usenet is a strange place." - Dennis M Ritchie, 29 July 1999.
C FAQ: http://www.eskimo.com/~scs/C-faq/top.html
34 K&R Answers: http://users.powernet.co.uk/eton/kandr2/index.html (63
to go)
------------------------------
From: David Youd <[EMAIL PROTECTED]>
Subject: Re: 40 Cryptography books reviewed
Date: Sun, 30 Apr 2000 19:10:46 GMT
"John A. Malley" wrote:
> That's a good list. Are you open to including crypto-reviews from other
> readers/posters to this USENET group? (Or suggestions of books for you
> to read and review when you get the chance?)
I don't want to moderate an open crypto book review database, but I'd love
any suggestions of books that I should find and read. Robert Reynard
(author of Secret Code Breaker series) was good enough to send me his books
(Woohoo! Free books!).
> For example, I'd recommend Decrypted Secrets by F.L.Bauer, a history of
> and exposition on cryptanalysis. And the Military Cryptanalysis series
> by William Friedman available from Aegean Park Press.
I've been meaning to get a copy of Friedman's "Military Cryptanalysis", but
never found a cheap used copy. Guess I'll just fork out the $$$.
> > Check out reviews of 40 cryptography books (plus an additional 10 not
> > yet reviewed) at:
> > http://www.youdzone.com/cryptobooks.html
------------------------------
From: Mok-Kong Shen <[EMAIL PROTECTED]>
Subject: Re: Of Mountains and Molehills
Date: Sun, 30 Apr 2000 21:21:43 +0200
wtshaw wrote:
> As simple switching mechanisms, you can use hard selection, or momentary
> selection...I have done both. It makes sense for text that lowercase is
> the solid default. If absolute coding is used, it is unforgiving,
> something which early techniques had to overcome. Commuication strings
> should lead home after coding errors, like a horse turned loose by
> mistake.
If I don't err, one could arrange such that the switching symbol can be
followed by a symbol to determine selecting from quite a number of subsets
of symbols, maybe also with the switching symbol itself gets changed in this
process. This would effectively mean a dynamic change of codes.
M. K. Shen
------------------------------
From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Diff analysis, I will get it sooner or later
Date: Sun, 30 Apr 2000 19:19:00 GMT
Ok I just looked at "Differential Cryptanalysis of Des-like
cryptosystems" and let's see if I got the xor-diff counting right...
m = size of input in bits
n = size of output in bits
a = 2^m - 1
b = 2^n - 1
DT[a+1][b+1] = { 0 }
S[] = the m by n sbox
for x = 0 to a
for y = 0 to b
DT[x xor y][S[x] xor S[x xor y]] += 1
Which says add one to the row 'x xor y' and column xor 'S[x] xor S[x xor
y]'
Is that right?
Tom
------------------------------
From: Tom St Denis <[EMAIL PROTECTED]>
Subject: Re: Diff analysis, I will get it sooner or later
Date: Sun, 30 Apr 2000 19:26:56 GMT
Tom St Denis wrote:
>
> Ok I just looked at "Differential Cryptanalysis of Des-like
> cryptosystems" and let's see if I got the xor-diff counting right...
>
> m = size of input in bits
> n = size of output in bits
> a = 2^m - 1
> b = 2^n - 1
> DT[a+1][b+1] = { 0 }
> S[] = the m by n sbox
>
> for x = 0 to a
> for y = 0 to b
> DT[x xor y][S[x] xor S[x xor y]] += 1
Oops, that is
for x = 0 to a
for y = 0 to b
DT[x xor y][S[x] xor S[y]] += 1
Which gets the similar rows as the paper (see above) but not in the same
order.. something is still wrong... hmm
Tom
------------------------------
From: George Edwards <[EMAIL PROTECTED]>
Crossposted-To:
uk.media.newspapers,uk.legal,alt.security.pgp,alt.privacy,uk.politics.parliament,uk.politics.crime,talk.politics.crypto,alt.ph.uk,alt.conspiracy.spy,alt.politics.uk
Subject: Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net"
Date: Sun, 30 Apr 2000 20:34:36 +0100
In article <[EMAIL PROTECTED]>, NoSpam
<[EMAIL PROTECTED]> writes
>MI5 is building a new �25m e-mail surveillance centre that will have the
>power to monitor all e-mails and internet messages sent and received in
>Britain. The government is to require internet service providers, such as
>Freeserve and AOL, to have "hardwire" links to the new computer facility so
>that messages can be traced across the internet.
Perfectly simple. We all set up routines to spam M15 with multiple
postings each time we come online. Should bring the system down double
fast.
Actually, if I could trust any of them an inch, I wouldn't mind.
YOO HOO. Mr SPIYYEEEE! here I AM! POLITICAL AGITATOR! LONGHAIR. PAINTER.
DENIM WEARER! PISSED OFF WITH YOU ALL!!!! COME and GET ME!
--
George Edwards
------------------------------
Subject: Re: How would a 15 year old start?
From: mindlag <[EMAIL PROTECTED]>
Date: Sun, 30 Apr 2000 12:38:20 -0700
I am only 15, and I have read Applied Cryptography, I think that
he should be able to grasp the basic concept of cryptography,
and the basics of cryptanalysis. I am not the best at math, but
I could still understand most of the material in applied
cryptography (after a fair amount of time). I have also read
The Codebreakers and Cryptonomicon, they are all great books.
Just read and practice, spend time trying to figure out what the
heck an algorithm actually does to the input and why it is
nearly unbreakable ect. You should also pick up some books on
advanced math, I am now 3 grade levels above the class I am in
because of Cryptography, it's great.
* Sent from RemarQ http://www.remarq.com The Internet's Discussion Network *
The fastest and easiest way to search and participate in Usenet - Free!
------------------------------
From: George Edwards <[EMAIL PROTECTED]>
Crossposted-To:
uk.media.newspapers,uk.legal,alt.security.pgp,alt.privacy,uk.politics.parliament,uk.politics.crime,talk.politics.crypto,alt.ph.uk,alt.conspiracy.spy,alt.politics.uk
Subject: Re: Sunday Times 30/4/2000: "MI5 builds new centre to read e-mails on the net"
Date: Sun, 30 Apr 2000 20:45:03 +0100
In article <[EMAIL PROTECTED]>, JimD <dynastic@REMOVE_THIS
cwcom.net> writes
>All the more reason to use PGP.
What this?
--
George Edwards
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and sci.crypt) via:
Internet: [EMAIL PROTECTED]
End of Cryptography-Digest Digest
******************************