From: frantz@netcom.com (Bill Frantz)
To: cypherpunks@toad.com
Message Hash: 1dbbcb9017d47162e65b33a941b72843bc2e25a8d23f0ee93596c00a310652bb
Message ID: <199606181804.LAA13022@netcom8.netcom.com>
Reply To: N/A
UTC Datetime: 1996-06-19 01:37:12 UTC
Raw Date: Wed, 19 Jun 1996 09:37:12 +0800
From: frantz@netcom.com (Bill Frantz)
Date: Wed, 19 Jun 1996 09:37:12 +0800
To: cypherpunks@toad.com
Subject: Re: SafE Mail Corporation
Message-ID: <199606181804.LAA13022@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
At 12:55 AM 6/18/96 -0700, Lucky Green wrote:
>At 17:21 6/17/96, M.Wagoner (1 wrote:
>>We would like someone to be able or should I say try and crack our
>>encryption. IT IS IMPOSSIBLE.
>
>Sigh. Yet another one...
>
>Unless you make source code available, you will be at best ignored, and at
>worst sued by users of your product should they discover that your
>unbreakable encryption isn't so unbreakable after all. Unless you use a
>hardware RNG and OTPs, your statement that it is impossible to break your
>encryption software is simply false
Don't even assume that hardware RNGs and OTPs by themselves make a system
unbreakable. Go see NSA's web site on the Verona intercepts to see what
people who know what they are doing can do when users slip up using a OTP
system. http://www.nsa.gov:8080/
I'm with Lucky (and many others) 100% on this one. Snake Oil.
-------------------------------------------------------------------------
Bill Frantz | The Internet may fairly be | Periwinkle -- Consulting
(408)356-8506 | regarded as a never-ending | 16345 Englewood Ave.
frantz@netcom.com | worldwide conversation. | Los Gatos, CA 95032, USA
Return to June 1996
Return to “frantz@netcom.com (Bill Frantz)”
1996-06-19 (Wed, 19 Jun 1996 09:37:12 +0800) - Re: SafE Mail Corporation - frantz@netcom.com (Bill Frantz)