From: “Henry W. Farkas” <hfarkas@ims.advantis.com>
To: cypherpunks@toad.com
Message Hash: a34e4c0f1b992fee2399a6a0d0ad6f8695d5cabb712dff8cc6d4aa8b3176d1e6
Message ID: <Pine.A32.3.91.950913085122.47812A-100000@pangloss.ims.advantis.com>
Reply To: N/A
UTC Datetime: 1995-09-13 13:03:12 UTC
Raw Date: Wed, 13 Sep 95 06:03:12 PDT
From: "Henry W. Farkas" <hfarkas@ims.advantis.com>
Date: Wed, 13 Sep 95 06:03:12 PDT
To: cypherpunks@toad.com
Subject: Scientology tries to break PGP - and
Message-ID: <Pine.A32.3.91.950913085122.47812A-100000@pangloss.ims.advantis.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
On Tue, 12 Sep 1995, S. Keeling wrote:
> I would just like to point out that, when a LEA comes to you
> to get at the contents of your computer, (s)he is not going to
> patiently wait while your system wipes the offending evidence off your
> hard disk. The first thing they do is make a copy of everything, so
> they can work from the copy. Besides, you do have backup tapes laying
> around all over the place, don't you?
Acutally, I have *everything* laying around all over the place but I
suppose that's off-topic.
They have to decrypt the file sometime if they want it's "contents".
I use the -w option when encrypting. After encryption, the "dummy" file
(would be) embedded and the plaintext is wiped. The only "secret" key
is the "fake" key. The "real" key is under the blender in the kitchen.
(If I get busted and they search under the blender I will write back if
I'm in a position to do so. Not that I have anything to get busted for
of course. :) Don't back up plaintext and what is the problem here?
Where will they get the "real" data from? What does it matter where the
decryption takes place? And no, I don't have backup tapes laying around;
I use a Zip Drive! :-)
===========================================================================
Henry W. Farkas | Me? Speak for IBM? Fat chance.
hfarkas@ims.advantis.com |------------------------------------------------
hfarkas@vnet.ibm.com | http://newstand.ims.advantis.com/henry
henry@nhcc.com | http://www.nhcc.com/~henry
- ---------------------------------------------------------------------------
PGP 6.2.2 Key fingerprint: AA D0 F5 44 C1 8C 11 52 B3 80 34 1C CE 38 EC 53
Public key at: pgp-public-keys@pgp.mit.edu, and other popular key servers.
- ---------------------------------------------------------------------------
Brought to you by Henry's Hardware: Home of the Pretty Good Hack "We're not
fast, but it's not bad, and we're cheaper than the guy down the street!"
===========================================================================
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Auto-signed with Bryce's Auto-PGP v1.0beta
iQCVAwUBMFbWVqDthkLkvrK9AQFxlAP+P3blN7wD42aUNctsCF9QALqsRdGHPsdo
B6ALA72dqVYXGIsW9M3DVxXAM2WAosHl2rDKXbTrXwirxCJQBPkYQLT9Vdzl8nyJ
hb0uNb2zo9xQ8ImM/dCuUqGazW2tnnAXuHZ9KkwDAQFDwDpNtjkHYCSDRgKmPmWO
fUjGpsVViU8=
=3JI5
-----END PGP SIGNATURE-----
Return to September 1995
Return to ““Henry W. Farkas” <hfarkas@ims.advantis.com>”
1995-09-13 (Wed, 13 Sep 95 06:03:12 PDT) - Scientology tries to break PGP - and - “Henry W. Farkas” <hfarkas@ims.advantis.com>