From: Black Unicorn <unicorn@access.digex.net>
To: cypherpunks@toad.com (Cypherpunks List)
Message Hash: 03dcda144996a7a68a641b01c37202ea1b1e9907cbb30cd60687356c2deeece7
Message ID: <199405170549.AA07535@access3.digex.net>
Reply To: N/A
UTC Datetime: 1994-05-17 05:50:04 UTC
Raw Date: Mon, 16 May 94 22:50:04 PDT
From: Black Unicorn <unicorn@access.digex.net>
Date: Mon, 16 May 94 22:50:04 PDT
To: cypherpunks@toad.com (Cypherpunks List)
Subject: FBI decryption capability / MSDOS disk wipe question
Message-ID: <199405170549.AA07535@access3.digex.net>
MIME-Version: 1.0
Content-Type: text/plain
A few moments ago I uploaded a file called "hyperdsk.zip" to the soda (cwrc??)
site in the incoming directory.
My understanding is that this is a disk utility program with some encryption
option.
It is my hope that someone will take a look at the executable and try to
discover what method of encryption is used. I suspect DES, but that is a wild
guess without the slightest basis in evidence.
Although I do not want to comment more specifically on the list just yet, an
evaluation of the method and strength of the executable will go a long way to
answering questions about the capabilities and resolve of federal law
enforcement in cryptanalysis.
Unfortunately the executable offers no basic text documentation. (I assume it
is instead "online." As I am a mac user, these are unavailable to me.
I hope that some diligent MSDOS 'punk will take a look and see what can be
seen.
In addition, I was hoping someone could provider a pointer to a robust and
aggressive disk wipe utility. Something with varied triple wipe, or "DOD"
spec overwrite (which isn't really DOD spec at all) would be nice.
-uni- (Dark)
--
073BB885A786F666 nemo repente fuit turpissimus - potestas scientiae in usu est
6E6D4506F6EDBC17 quaere verum ad infinitum, loquitur sub rosa - wichtig!
Return to May 1994
Return to “Black Unicorn <unicorn@access.digex.net>”