1995-12-11 - [Noise] A vaguely humorous post

Header Data

From: “Don M. Kitchen” <don@wero.byu.edu>
To: cypherpunks@toad.com
Message Hash: 12acecb60ee34999cd900830b896fb070501a97697b18410e2b799253a4b4d54
Message ID: <199512111002.DAA00907@wero.byu.edu>
Reply To: N/A
UTC Datetime: 1995-12-11 14:57:21 UTC
Raw Date: Mon, 11 Dec 1995 22:57:21 +0800

Raw message

From: "Don M. Kitchen" <don@wero.byu.edu>
Date: Mon, 11 Dec 1995 22:57:21 +0800
To: cypherpunks@toad.com
Subject: [Noise] A vaguely humorous post
Message-ID: <199512111002.DAA00907@wero.byu.edu>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

I saw some fool posting to alt.security among other places trying to
get his basic program to do OTP's. On the off chance that anybody
thinks this is funny, here's my response:

In-reply-to: spy@vs.spy's message of 10 Dec 1995 05:02:17 GMT
Newsgroups: alt.2600,alt.2600.programz,alt.security
Followup-To: alt.2600
Subject: Re: HELP....This will not work; I am perplexed.
Reply-to: don@cs.byu.edu
References: <4adpkp$3id@mercury.initco.net>
- --text follows this line--

> 60  INPUT "HOW MANY ONE TIME PADS DO YOU WANT?";NUMB
[snip]
> 160 RANDOMIZE E
> 170 X=INT(RND(0)*90)+1

This isn't sci.crypt so I won't flame, but I feel I should point out
that "One Time Pad" is a registered trademark of Cypherpunks, Ltd, and
that any inferrence that anything coming out of a basic randomizer is
"One", "Time", or "Pad" is a blatent trademark violation.

As a courtesy to the public, Cypherpunks, Ltd, makes freely available it's
patented One Time Pad technology. Using PGP, you may enter the top-secret
activation code thusly: "pgp +makerandom=[size] [filename]" where [size] is the
size, in bytes, of your Cypherpunk[tm]-generated, super-cryptographically-
secure, ultimate One Time Pad[tm], and [filename] is where you want it
stored. You can rest assured that with your cypherpunk[tm] One-Time-Pad[tm],
not even a Cypherpunk[tm] can break your code without breaking your bones.

> **Have you been compromised?  If the answer is no,
>  you had better think again.

With security ideas like that, I'm not surprised. MD5 man, MD5.

PS, try to zip a large output from pgp makerandom. Now try a large output
from basic. Hmmmm. Which one Just Wont Compress[tm]?

Happy Monday everyone.

PS: got mail crypt working, it's awesome. It's quite seamless, up to the
point where my home box doesn't have incoming mail service and EMACS
doesn't have built in POP or IMAP. (Yet).  But great for nntp and PGP.

Don
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQB1AwUBMMwBmcLa+QKZS485AQHKLAL6Ah4881dbMan91wNL2TJjvGMHe75Xwzrw
YI0x5/XsmuoYv7M6qn4O+MZ9vEF51ES1sJaW5bOQ5Gq0vJn2bmGVIV+kmbn2p3TZ
ZHxkv51NW7zxwRgyvnezwyYwBrY10bQ2
=eoAc
-----END PGP SIGNATURE-----

-- 
<don@cs.byu.edu>           fRee cRyPTo!   jOin the hUnt or BE tHe PrEY
PGP key - http://students.cs.byu.edu/~don   or PubKey servers (0x994b8f39)
  June 7&14, 1995: 1st amendment repealed.  Junk mail to root@127.0.0.1
* This user insured by the Smith, Wesson, & Zimmermann insurance company *





Thread