[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: What's really in PGP 5.5?
-----BEGIN PGP SIGNED MESSAGE-----
Anonymous, claiming to be Monty Cantsin, writes about PGP 5.5:
>
>Decrypting files and decrypting messages are not the same problem.
>The PGP product has SMTP support - it is explicitly designed to weaken
>transmitted messages. Just like Clipper.
>
No, it isn't "just like Clipper." Messages encrypted with PGP 5.5
can be decrypted or verified by PGP 5.0 or other implementations that
can decode the PGP message and encryption format. Also, PGP 5.0 or other
complient implementations can send encrypted and signed messages to
PGP 5.5 users.
The transmitted message is as "weak" as the quality of the encryption,
the number of people who have access to the secret key, and the
quality of their passwords. It is also as "weak" as the physical
security that prevents passwords from leaking (i.e., by Tempest
or black bag wiretaps inside the secure user's workstation).
Given all of the other risks, encrypting to a corporate private
key doesn't seem to me to significantly increase the risk.
The real risk, to my view, is that some future implementation will
require the secondary key, and will require that that secondary
key be stored in a "government accessable" database. This, however,
seems a bit remote and, given that PGP publishes their source code,
reasonably easy to detect.
Martin Minow
[email protected]
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQCVAwUBND0KUG23+ciinrc5AQGvMgP9HKE4s/3FbjfFpvfC230wvHkjDd2HWyC1
lhVa/i9ayO8pZC/k+V06pGTZLcZ89a4X2r3fQGjj0QNghuotkV9xVVD9AzLTLX88
YPp2DQWDCjkWq4PzBB8IR6c+rH6AbuqtDAhfas/Rto/9DI7EJWqi3dZbi7tFm7jj
g2nTAFk9VVo=
=DkbK
-----END PGP SIGNATURE-----