At 11:38 AM 05/30/2003 -0700, John Young wrote:
If the FBI cannot crack PGP that does not mean other
agencies with greater prowess cannot. It is unlikely that
the capability to crack PGP would be publicly revealed
for that would close an invaluable source of information.
.
Still, it is
At 08:17 AM 06/03/2003 -0700, bear wrote:
what he said was with cryptanalysis alone.
Rubber-hose methods are not cryptanalysis, and
neither is password guessing.
Eh? Password guessing certainly is.
I'm not aware of a PGP port to the Psion, but at least the
Psion 3/3a/3c generation were 8086-like
The article hedges on whether or not PGP was used on the Psion mentioned.
The Psion might have been using one of the other programs listed at
http://www.ericlindsay.com/epoc/sicrypt5.htm.
-
The Cryptography Mailing List
Aside from the whole governments-and-people-and-terrorists thing,
I will say that there was an event last year at my former employers'
that made us very glad we were using PGP.
An engineer's laptop got stolen. With the entire source tree of an
enterprise application that licensed for $25K a seat
If the FBI cannot crack PGP that does not mean other
agencies with greater prowess cannot. It is unlikely that
the capability to crack PGP would be publicly revealed
for that would close an invaluable source of information.
Intel crackers hardly ever reveal their most essential
tools, though
At 1:22 PM -0400 5/29/03, Ian Grigg wrote:
The following appears to be a bone fide case of a
threat model in action against the PGP program.
Leaving aside commentary on the pros and cons
within this example, there is a desparate lack of
real experience in how crypto systems are attacked.
IMHO,