If the FBI cannot crack PGP that does not mean other agencies with greater prowess cannot. It is unlikely that the capability to crack PGP would be publicly revealed for that would close an invaluable source of information. Intel crackers hardly ever reveal their most essential tools, though
New book by Joel McNamara who runs the Tempest website: http://www.eskimo.com/~joel/tempest.html http://www.wiley.com/legacy/compbooks/mcnamara/ Secrets of Computer Espionage: Tactics and Countermeasures by Joel McNamara Covers electronic and wireless eavesdropping, computer surveillance,
James Ellis, GCHQ, in his account of the development of non-secret encryption credits a Bell Laboratories 1944 report on Project C-43 for stimulating his conception: http://www.cesg.gov.uk/publications/media/nsecret/possnse.pdf The Possibility of Secure Non-Secret Digital Encryption J. H.
We offer a recent South African government statement on encryption import and export regulation: http://cryptome.org/za-crypto.htm - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communications, by Elad Barkan, Eli Biham, Nathan Keller http://cryptome.org/gsm-crack-bbk.pdf (18 Pages, 234KB) Abstract. In this paper we present a very practical cipher-text only cryptanalysis of GSM encrypted communications, and
Lynn and John Saylior have raised an important point. Who at Baltimore, or was once there, is likely to be able to account for the security of the certs for customers who still rely upon them? Not somebody to spin a fairy tale, but to truthfully explain what Baltimore has done to avoid