1993-10-06 - Cyphertrivia

Header Data

From: Alan Mason <vznquest@netcom.com>
To: cypherpunks@toad.com
Message Hash: fca6811509a73ca6036df00a32d36a6d39e43e38a44d97370ce51509d3c0f1ef
Message ID: <Pine.3.05.9310052151.B29273-b100000@netcom5>
Reply To: <9310060452.AA03396@netcom5.netcom.com>
UTC Datetime: 1993-10-06 04:59:10 UTC
Raw Date: Tue, 5 Oct 93 21:59:10 PDT

Raw message

From: Alan Mason <vznquest@netcom.com>
Date: Tue, 5 Oct 93 21:59:10 PDT
To: cypherpunks@toad.com
Subject: Cyphertrivia
In-Reply-To: <9310060452.AA03396@netcom5.netcom.com>
Message-ID: <Pine.3.05.9310052151.B29273-b100000@netcom5>
MIME-Version: 1.0
Content-Type: text/plain


> 
> OK, so if you were really paranoid, you wouldn't even let 'THEM' know you
> were using pgp.
> 
> But... if you were only mildly paranoid, you would:
> 
> 1.  Break your message into several short blocks
> 
> 2.. Encrypt them with your friends public pgp key in ascii format
> 
> 3.  Change the parts of the messages that say "BEGIN (END) PGP MESSAGE" to
> read  "BEGIN (END) PGP PUBLIC KEY BLOCK"
> 
> 4.  Post them in an innocuous place and let the recipient know that they
> are there.  When he/she decypts them, he/she doesn't even need to change
> "PGP PUBLIC KEY BLOCK" back to "PGP MESSAGE".  Thanks, Phil :).
> 
> In this way, you can console your paranoia by telling it that while the
> cryptocops may know you HAVE pgp, they don't know you are using it
> to send messages.
> 
> Trivial, I know, but hey - it was one of those trivial days........
> 
>    
> -----------------------------------------------------------------------------
> A Paranoid 2		|   Any time you find a simple answer to a question,
> aka vznquest@netcom.com	|   The odds are you asked the wrong question.
> *******************     |
> ----------------------------------------------------------------------------








Thread