Ok, ok. I get tha point. I've scheduled self-flagellation for later. Let's
drop this thread already.

-----Original Message-----
From: Mat Branyon
To: [email protected]
Sent: 6/19/03 4:00 PM
Subject: Re: [brlug-general] we need more encryption was RE: NSA's
decryption clusters vs GPG, et.al.

Yea, outlook, what is that?  I don't see it in the portage tree... Must
be beta or something, maybe alpha still.

--mat

On Thu, 2003-06-19 at 15:26, Alvaro Zuniga wrote:
> No sure what you are talking about? I use Kmail.
> 
> On Thursday 19 June 2003 09:20 am, Dustin Puryear wrote:
> > On behalf of the group: Why the heck do you keep using this weird
> > my-responses-are-marked-with-John quoting style? Are you having a
problem
> > with Outlook?
> >
> > At 06:40 PM 6/18/2003 -0500, you wrote:
> > >-----Original Message-----
> >
> > From: Alvaro Zuniga
> >
> > >To: [email protected]
> > >Sent: 6/18/03 6:20 PM
> > >Subject: Re: NSA's decryption clusters vs GPG, et.al. was RE: GPG
does not
> > >pro vide "end to end encryption", but only mail c onte nt
encryption was
> > > RE: [brlug-general] Cox and smtp pain today.
> > >
> > >Dear John:
> > >
> > >I suppose from this point of view there is not need to even bother
with
> > >encryption because brute force eventually prevails.
> > >
> > >John: Not at all. The dilemma that the NSA faces is that they want
to
> > >decrypt messages A,B,C,... but they will always have limited
resources to
> > >perform brute force decryption. So, they better be damned sure that
> > > message A is the most important of all the messages they want to
decrypt.
> > >
> > >However,  a better cipher requires that many more computers
exponentially;
> > >therefore,  we could at least make it more difficult for those who
really
> > >care about our business.
> > >
> > >John: Or just have more people using encryption. I've read
estimates that
> > >less than 1% of Internet traffic is encrypted. By merely advocating
that
> > >more people use encryption and raising that to 2%, we would require
the
> > > NSA and other intelligence operations to double their decryption
> > > resources. This is the nightmare scenario that keeps the NSA IT
Director
> > > up at night.
> > >
> > >This reminds me of that John Travolta movie swordfish where the
computer
> > >person gradually quintuple the encryption of an algorithm to hide a
bank
> > >account. He also kept switching the values every few seconds
ensuring
> > >that it would be impossible to decrypt using brute force.
> > >
> > >John: As long as those values are random enough. If any pattern to
those
> > >values could be predicted and duplicated, brute force would still
work.
> > >
> > >John Hebert
> > >_______________________________________________
> > >General mailing list
> > >[email protected]
> > >http://brlug.net/mailman/listinfo/general_brlug.net
> > >
> > >_______________________________________________
> > >General mailing list
> > >[email protected]
> > >http://brlug.net/mailman/listinfo/general_brlug.net
> >
> > ---
> > Dustin Puryear <[EMAIL PROTECTED]>
> > Puryear Information Technology
> > Windows, UNIX, and IT Consulting
> > http://www.puryear-it.com
> >
> >
> > _______________________________________________
> > General mailing list
> > [email protected]
> > http://brlug.net/mailman/listinfo/general_brlug.net
> 
> 
> _______________________________________________
> General mailing list
> [email protected]
> http://brlug.net/mailman/listinfo/general_brlug.net

Reply via email to