--- begin forwarded text

Cc: Cocoa Development <[EMAIL PROTECTED]>,
        Kyle Moffett <[EMAIL PROTECTED]>,
        Shawn Erickson <[EMAIL PROTECTED]>
From: Sherm Pendley <[EMAIL PROTECTED]>
Subject: Re: [OT] Encryption
Date: Fri, 2 Jan 2004 16:20:50 -0500
To: Robert Tito <[EMAIL PROTECTED]>
List-Id: Discussions regarding native Mac OS X application development
using Cocoa frameworks. <cocoa-dev.lists.apple.com>
List-Post: <mailto:[EMAIL PROTECTED]>
List-Help: <mailto:[EMAIL PROTECTED]>
List-Subscribe: <http://www.lists.apple.com/mailman/listinfo/cocoa-dev>,
        <mailto:[EMAIL PROTECTED]>

On Jan 2, 2004, at 3:08 PM, Robert Tito wrote:

> But the FBI and NSA and CIA have tried to crack our solutuion (meaning
> the
> encrypted file) but they failed.

How do you know they failed? If they succeeded, they wouldn't tell you
about it.

One of the basic tenets of applied cryptology is that cracking a code
is only useful until your target becomes aware that his code has been
cracked. At that point, he will either switch codes, or start feeding
you misinformation with the code that's been compromised.

Frankly my friend, you're losing credibility with each post you make.
Not only do your technical explanations make no sense, you don't seem
to have much of a grasp on how encryption is used in the real world.

cocoa-dev mailing list | [EMAIL PROTECTED]
Do not post admin requests to the list. They will be ignored.

--- end forwarded text

R. A. Hettinga <mailto: [EMAIL PROTECTED]>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to