[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Rude CryptoStacker Suggestion
On Mon, 14 Jun 1993, RYAN Alan Porter wrote:
>On Mon, 14 Jun 1993, Mark Shewmaker wrote:
>
>I don't consider us without options, I just have yet to see a program that
>I would trust my data with.
>
>Besides, I wouldn't consider it a waste of effort even if there were such
>a system out there (which I doubt)
Well then I have doubts about your doubts: Even I've got a few ways of
getting transparent compression or encryption on my own system (amiga),
most of them simply device drivers or some other standalone sets of code
one would then to use to mount a (virtual) partition, and there's also a
more standardized compression/encryption modular system to do the same
thing (sort of), just like you talk about later.
That's why I keep thinking that for PC's and freely distributable source
code for encrypting file systems, that by now someone *must* have already
invented the wheel. (Although you could still invent the radial tire,
so to speak, and make the original idea more usable.)
>Anyway, thanks for the suggestion; I would be interested in any parallel
>systems which anyone might happen to stumble upon.
Seeing as you had previously said:
>The sources for bare network redirectors and block device drivers are,
>indeed, in wide supply.
I guess I really should upload some of the amiga code then, even though
a great deal of it will absolutely useless to you, (but I must admit
it would be kinda cool if pc's and amigas could both access the same
compressed/encrypted xpk files.) If it's really just the encryption
part per se that you are missing, then they might be helpful to your
project.
I'll write up a description, plagiarizing the readme files somewhat,
and upload a few of the archives to Eric's site.
>The more people who know how to implement good encryption, the more
>widespread other cypher code will become.
Very true.
(I'm always annoyed when I download a new "security" type program,
only to find it lets you encrypt/decrypt with any of ten proprietary
methods, numbered one through ten. Absolutely useless. And of course
the scums never include the source. Grrr.)
>(Oh also, have I come off lately as being incredibly overflamesensitive,
>or are you just a very cautionary guy? I can understand it if I have
>projected a flameshield attitude, but I'm really not that bruisable...)
"Jane, you ignorant slut." (Implied smileys for the SNL-impaired.)
Partly I'm cautionary, trying to be polite, tit for tat and all that,
but also I don't like being the 100th person whining about your project,
(especially knowing next to nothing about DOS systems), while people who
think it's a neat idea keep quiet. Plus I overdid the cautiousness a bit.
(And I've got this pet peeve about people re-introducing obvious ideas
in sci.crypt, and similar places.)
-Mark Shewmaker