1998-01-15 - Re: Crypto Kong penetration.

Header Data

From: Julian Assange <proff@iq.org>
To: “James A. Donald” <jamesd@echeque.com>
Message Hash: e44b4151e25f45d7cc6df9ae1d1c777fd9567a0043a8cb84f7ca5e75d520e01e
Message ID: <wx3eiqps5o.fsf@polysynaptic.iq.org>
Reply To: <199801142049.MAA02259@proxy4.ba.best.com>
UTC Datetime: 1998-01-15 00:07:24 UTC
Raw Date: Thu, 15 Jan 1998 08:07:24 +0800

Raw message

From: Julian Assange <proff@iq.org>
Date: Thu, 15 Jan 1998 08:07:24 +0800
To: "James A. Donald" <jamesd@echeque.com>
Subject: Re: Crypto Kong penetration.
In-Reply-To: <199801142049.MAA02259@proxy4.ba.best.com>
Message-ID: <wx3eiqps5o.fsf@polysynaptic.iq.org>
MIME-Version: 1.0
Content-Type: text/plain



"James A. Donald" <jamesd@echeque.com> writes:

>     -- 2
> Since release there have been a very large number of hits on
> the Kong documents, and mere 102 downloads of the program,
> and 74 downloads of the source code.
> 
> The large number of source code downloads indicates that I am
> only reaching the crypto techie audience, that for the most
> part is already able to use PGP, not the non tech audience
> that Crypto Kong was designed for.
> 

My first recomendation would be to change the name. Quickly.

Cheers,
Julian.






Thread