1996-06-19 - Re: SafE Mail Corporation

Header Data

From: frantz@netcom.com (Bill Frantz)
To: cypherpunks@toad.com
Message Hash: 1dbbcb9017d47162e65b33a941b72843bc2e25a8d23f0ee93596c00a310652bb
Message ID: <199606181804.LAA13022@netcom8.netcom.com>
Reply To: N/A
UTC Datetime: 1996-06-19 01:37:12 UTC
Raw Date: Wed, 19 Jun 1996 09:37:12 +0800

Raw message

From: frantz@netcom.com (Bill Frantz)
Date: Wed, 19 Jun 1996 09:37:12 +0800
To: cypherpunks@toad.com
Subject: Re: SafE Mail Corporation
Message-ID: <199606181804.LAA13022@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 12:55 AM 6/18/96 -0700, Lucky Green wrote:
>At 17:21 6/17/96, M.Wagoner (1 wrote:
>>We would like someone to be able or should I say try and crack our
>>encryption. IT IS IMPOSSIBLE.
>
>Sigh. Yet another one...
>
>Unless you make source code available, you will be at best ignored, and at
>worst sued by users of your product should they discover that your
>unbreakable encryption isn't so unbreakable after all. Unless you use a
>hardware RNG and OTPs, your statement that it is impossible to break your
>encryption software is simply false

Don't even assume that hardware RNGs and OTPs by themselves make a system
unbreakable.  Go see NSA's web site on the Verona intercepts to see what
people who know what they are doing can do when users slip up using a OTP
system.  http://www.nsa.gov:8080/

I'm with Lucky (and many others) 100% on this one.  Snake Oil.


-------------------------------------------------------------------------
Bill Frantz       | The Internet may fairly be | Periwinkle -- Consulting
(408)356-8506     | regarded as a never-ending | 16345 Englewood Ave.
frantz@netcom.com | worldwide conversation.    | Los Gatos, CA 95032, USA







Thread