From: Eric Murray <ericm@lne.com>
To: shamrock@netcom.com (Lucky Green)
Message Hash: ca9c5c7254b75385d98e3c2a320f61a1174cc2a5a1eee564f6ac01754d9cceb4
Message ID: <199708291654.JAA12979@slack.lne.com>
Reply To: <3.0.2.32.19970829091223.0072c1bc@netcom10.netcom.com>
UTC Datetime: 1997-08-29 17:05:17 UTC
Raw Date: Sat, 30 Aug 1997 01:05:17 +0800
From: Eric Murray <ericm@lne.com>
Date: Sat, 30 Aug 1997 01:05:17 +0800
To: shamrock@netcom.com (Lucky Green)
Subject: Re: p.s. -- Re: ASK ToolKit Clarifications
In-Reply-To: <3.0.2.32.19970829091223.0072c1bc@netcom10.netcom.com>
Message-ID: <199708291654.JAA12979@slack.lne.com>
MIME-Version: 1.0
Content-Type: text/plain
Lucky Green writes:
>
> At 07:50 AM 8/29/97 -0600, Myron Lewis wrote:
> >Myron Lewis wrote:
> >> I know that the claims we make for the ASK ToolKit(TM) sound a little too
> >> good to be true. In fact, someone I have been talking to for a while about
> >> other subjects and who I thought respected my views told me that "If it
> >> sounds too good to be true, it probably is-- too good to be true. "
> >
> >I forgot to mention...it can also be used to break PGP encryption.
>
> When making such strong claims, it would behoove the author to provide an
> example.
Check the headers. The one you're replying to was a forgery.
> Until such time, the ASK toolkit will be justly regarded as snakeoil.
>From the description, it sounds like a fancy API for a PRNG.
Not snakeoil, but not all that useful either.
--
Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com
(email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5
Return to August 1997
Return to “Myron Lewis <mrlewis@keygen.com>”