From: Adamsc@io-online.com (Adamsc)
To: “Dale Thorn” <stewarts@ix.netcom.com>
Message Hash: 04cdee455863f711eb031c6fcef2714a8762125cc1a42f6df56ec1deb76ba39a
Message ID: <19961110024029578.AAA189@localhost>
Reply To: N/A
UTC Datetime: 1996-11-10 02:42:38 UTC
Raw Date: Sat, 9 Nov 1996 18:42:38 -0800 (PST)
From: Adamsc@io-online.com (Adamsc)
Date: Sat, 9 Nov 1996 18:42:38 -0800 (PST)
To: "Dale Thorn" <stewarts@ix.netcom.com>
Subject: Re: Information [for new PGP user]
Message-ID: <19961110024029578.AAA189@localhost>
MIME-Version: 1.0
Content-Type: text/plain
On Thu, 07 Nov 1996 07:08:52 -0800, Dale Thorn wrote:
>> >> > I'm a new Cyberpunk!
>> Probably wearing a set of Ono-Sendai eyeballs....
>> >> > Last, I would like to know once and for all, is PGP compromised, is
>> >> > there a back door, and have we been fooled by NSA to believe it's secure?
>> You can read and compile the source code yourself.
>Really? All 60,000 or so lines, including all 'includes' or attachments?
>I'll bet you can't find 10 out of 1,000 users who have read the total source,
>let alone comprehended and validated it.
That's not necessary - it's the fact that it's possible that matters; most
of us are content to trust the various people who actually have. However,
I'd probably be inclined to look into it seriously if I was going to use it
on anything incriminating or potentially linked to my checkbook...
# Chris Adams <adamsc@io-online.com> | http://www.io-online.com/adamsc/adamsc.htp
# <cadams@acucobol.com> | send mail with subject "send PGPKEY"
"That's our advantage at Microsoft; we set the standards and we can change them."
--- Karen Hargrove, Microsoft (quoted in the Feb 1993 Unix Review editorial)
Return to November 1996
Return to “Adamsc@io-online.com (Adamsc)”
1996-11-10 (Sat, 9 Nov 1996 18:42:38 -0800 (PST)) - Re: Information [for new PGP user] - Adamsc@io-online.com (Adamsc)