[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Dolphin Encrypt



<tried to email this, but it bounced>

I too would like more info on this subject!  Guess all us yokels at UNM are
clueless or something.  My question is, how does the recipient get the key,
and how do they (she, whatever) know to use that long de command? What would
happend if they didn't, just get gibberish?

> 
> The recipient captures the entire message as, say, G.ENC, then runs:
> 
>                        DE D G.ENC G.DEC /t
> 
> (Of course, she has to know the encryption key.)  Dolphin Encrypt
> skips over P1 to get at C2 and writes G.DEC containing P2.  Voila!
> 
> For further info send me a snailmail address.

See below for snail address...

-- 
Testes saxi solidi!  **********************   Podex opacus gravedinosus est!  
Stanton McCandlish,  SysOp:  Noise in the Void Data Center BBS
IndraNet: 369:1/1      FidoNet: 1:301/2      Internet: [email protected]
Snail: 8020 Central SE #405, Albuquerque, New Mexico 87108 USA
Data phone: +1-505-246-8515 (24hr, 1200-14400 v32bis, N-8-1)
Vox phone:  +1-505-247-3402 (bps rate varies, depends on if you woke me up...:)