From: Benjamin Grosman <bgrosman@healey.com.au>
To: coderpunks@toad.com
Message Hash: c905c2e38105401ec6c90d5364b70c72622f756e163b1f3cae89511de063b968
Message ID: <2.2.32.19961104002900.00926724@healey.com.au>
Reply To: N/A
UTC Datetime: 1996-11-04 00:34:40 UTC
Raw Date: Sun, 3 Nov 1996 16:34:40 -0800 (PST)
From: Benjamin Grosman <bgrosman@healey.com.au>
Date: Sun, 3 Nov 1996 16:34:40 -0800 (PST)
To: coderpunks@toad.com
Subject: ASIO encryption ?
Message-ID: <2.2.32.19961104002900.00926724@healey.com.au>
MIME-Version: 1.0
Content-Type: text/plain
Dear All,
Does anyone happen to know what encryption methods, algorithms, or
procedures ASIO (Australian Secret Intelligence Organisation) uses? Any
information regarding ASIO's methods, cryptographic or otherwise, would be
appreciated.
Yours Sincerely,
Benjamin Grosman
Return to November 1996
Return to “Eraser <security@myinternet.net>”