From: Anonymous <anon@anon.efga.org>
To: cypherpunks@cyberpass.net
Message Hash: 5fd9db048dac2388df793b54af5d2e755d45f90f8cf7daa9a910f6ba16e69946
Message ID: <de77e8eade35480a3e2553b5dbc0cd26@anon.efga.org>
Reply To: N/A
UTC Datetime: 1997-10-08 23:16:43 UTC
Raw Date: Thu, 9 Oct 1997 07:16:43 +0800
From: Anonymous <anon@anon.efga.org>
Date: Thu, 9 Oct 1997 07:16:43 +0800
To: cypherpunks@cyberpass.net
Subject: What's really in PGP 5.5?
Message-ID: <de77e8eade35480a3e2553b5dbc0cd26@anon.efga.org>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
Ryan Anderson wrote:
>>What you call "fragility" is properly called "security". Would you
>>describe 128-bit keys as more "fragile" than 40-bit keys? Why is PGP,
>>Inc. inventing propaganda terms for the authorities?
>
>Okay, call it security but the point is, if you're protecting documents vital
>to your company using encryption (say the design of a new product) and the
>person who knows the passphrase dies, you've just lost a great deal of money.
>
>PGP for Business Security gives the business a way to have a backup key that
>can read that person's information. Frankly, it might not be able to read
>anybody elses, from the description given.
>
>This is a feature that any business (that understands encryption) will want.
>
>They can easily store the secret keys of the other id someplace secure, and
>never retrieve them until someone dies. Disavow knowledge of them to
>government, etc. heck, the keys can even be in the primary person's
>posession. (Perhaps stored in a safe-deposit box, or without a passphrase,
>etc.)
Decrypting files and decrypting messages are not the same problem.
The PGP product has SMTP support - it is explicitly designed to weaken
transmitted messages. Just like Clipper.
[Jon Callas wrote:]
>>It is fascinating to me that every example you use does not involve
>>decrypting transmitted messages. Yet, that is the feature which is
>>under discussion.
>
>Amazingly, he gave an example where, had encryption been used, the
>project would have stopped, and restarted because the person with the
>keys was incapacitated. Are you just being combative here?
No. I am making the distinction between files and messages.
It is quite easy to use a key for encrypting files which is different
from encrypting your messages. The key for encrypting files can then
given to the appropriate company officer. It has been possible to use
PGP in this mode forever.
What is new is the feature set which will make it very easy to impose
GAK on the customers of PGP. According to Mr. Schneier, the code is
just sitting there in all their products waiting to be compiled in.
>>The demand for the ability to decrypt encrypted messages in the
>>corporate environment can easily be measured with this test: how
>>many companies have a policy that requires employees to record all
>>outgoing mail?
>
>Well, any company giving stock advice (and governed by SEC rules on
>stock tips, etc.) is already require to have all outgoing mail
>approved (e-mail and snail), so does it matter if they record it or
>not?
The answer to the question I posed is "No". The example you cite
requires the company to review message before transmission, not
afterward.
After transmission, the recipient of the message can submit it as
evidence to the SEC should there be an impropriety. This is no
different from the way it works now.
There is probably a context issue here. It sounds like you do not
share the context within which many people on this list are operating.
The Big Problem for PGP, Inc. right now is that in 18 months or so
their products may be illegal to use within the United States. While
many of the rank and file in the company may be willing to accept
corporate dissolution under those circumstances, the board, the
investors, and the senior management are unlikely to welcome that
option.
So, they are preparing for that situation. They are releasing
products with GAK support right now. By the time it becomes mandated
by law, it will be easy to compile the well tested features into all
of the products, or just discontinue their line of privacy products
and sell only their Big Brother Inside products.
The corporate key becomes the government key with the stroke of a pen.
PGP, Inc. is betting that they'll win either way. If GAK goes down in
flames again, they can still trade on their reputation for being The
Good Guys. If GAK becomes mandated by law: "We didn't want to do it,
but we had no choice."
Some of us may be in the habit of thinking of PGP, Inc. as the hero.
However, the problem with organizations is that they are easily
corrupted.
Does this mean everybody in the organization is now working for the
government? No, it does not. Most likely there are many PGP, Inc.
employees who are feeling uncomfortable with this new development but
they are being given the same lines we are getting. Many of these
people are probably getting an additional "inside scoop" from their
leaders that explains the "real" strategy. Hopefully, the rank and
file at PGP knows that people you like and see in the hallways every
day will still lie to you if they think their career depends on it.
Monty Cantsin
Editor in Chief
Smile Magazine
http://www.neoism.org/squares/smile_index.html
http://www.neoism.org/squares/cantsin_10.html
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQEVAwUBNDuw65aWtjSmRH/5AQGwLgf7BBYy2HO30eDXO2YLqkgtuOxAcnQU19AO
DOKIa3jwU723ICgWD00dPW1GegKL5LaRfp3a+Xtd+qjHaFs0IlXr4kJGv1wiCJhu
sRKxmSi3g1aGIfiF48uMef5bbzPL27b3u78rJds+E44LP9zEnieBcACBp+3977W0
0N0k7ADY6ME+zmc4f5D5aLdJa8gprOCPj1nF6esspkMuDDu5iH/YY/GT6VprRCub
NojEXPS/uB6tgTS4vDfenL8UWUUqjXQof8MrRoMAG6dsjvNEyU5WlhbnDgyh9nF5
DbuP9+oA8DHYSmEGzTxD4oG7mGwb+NMMuYOyg3xC1H8ou2Ajv0kfOg==
=UtlQ
-----END PGP SIGNATURE-----
Return to October 1997
Return to “Martin Minow <minow@apple.com>”