From: stewarts@ix.netcom.com (Bill Stewart)
To: danisch@ira.uka.de (Hadmut Danisch)
Message Hash: d4671d951bbfff654d0666dad919f12ad7a5779371f90dbffd2454720970e04c
Message ID: <199508012145.OAA05756@ix6.ix.netcom.com>
Reply To: N/A
UTC Datetime: 1995-08-01 21:50:03 UTC
Raw Date: Tue, 1 Aug 95 14:50:03 PDT
From: stewarts@ix.netcom.com (Bill Stewart)
Date: Tue, 1 Aug 95 14:50:03 PDT
To: danisch@ira.uka.de (Hadmut Danisch)
Subject: Re: a hole in PGP
Message-ID: <199508012145.OAA05756@ix6.ix.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
>It is definitely much more difficult to implant a backdoor into a program
>which is available as source code than into a black box.
>
>BTW: Has anyone ever found a modified and weakened version of pgp ?
Not that I know of, but there were some versions with a bug in the random-input
generation - I forget if that was with ~2.2 or ~2.6.0; Colin Plumb had something
to do with it. I've recently acquired ViaCrypt 2.7.1 for WinDows, and one
nice feature
is that in addition to typing in random keystrokes, you can click your mouse in
a box and wave it around to input randomness.
#---
# Thanks; Bill
# Bill Stewart, Freelance Information Architect, stewarts@ix.netcom.com
# Phone +1-510-247-0664 Pager/Voicemail 1-408-787-1281
#---
# Crypto in 3-4 lines of perl --> http://dcs.ex.ac.uk/~aba/
Return to August 1995
Return to “stewarts@ix.netcom.com (Bill Stewart)”
1995-08-01 (Tue, 1 Aug 95 14:50:03 PDT) - Re: a hole in PGP - stewarts@ix.netcom.com (Bill Stewart)