From: Dark <unicorn@access.digex.net>
To: mg5n+@andrew.cmu.edu
Message Hash: 44bccef301e93d1ad4fd8cb7ce14804c471225029517ecd39bb3fca01ff7ebef
Message ID: <199311070733.AA12593@access.digex.net>
Reply To: N/A
UTC Datetime: 1993-11-07 07:38:05 UTC
Raw Date: Sat, 6 Nov 93 23:38:05 PST
From: Dark <unicorn@access.digex.net>
Date: Sat, 6 Nov 93 23:38:05 PST
To: mg5n+@andrew.cmu.edu
Subject: Re: (fwd) ViaCrypt PGP ships today
Message-ID: <199311070733.AA12593@access.digex.net>
MIME-Version: 1.0
Content-Type: text/plain
->
I don't see how this would be of much help tho. Putting a weakness in
the secret key password wouldn't help them much since they don't have
your secret key. Furthermore, they couldn't easily change it without
making it incompatible with previous keys. If I wanted to subtly weaken
<--
oh, yeah.
I knew that.
-uni- (Dark)
Return to November 1993
Return to “Dark <unicorn@access.digex.net>”
1993-11-07 (Sat, 6 Nov 93 23:38:05 PST) - Re: (fwd) ViaCrypt PGP ships today - Dark <unicorn@access.digex.net>