Penetration Testing mailing list archives
RE: PGP 9.0
From: "Ebeling, Jr., Herman Frederick" <hfebelingjr () lycos com>
Date: Fri, 6 Jan 2006 20:54:00 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----Original Message---- From: John E. Fleming [mailto:John () parcassets com] Sent: Friday, 06 January, 2006 13:55 To: kuffya () gmail com; pen-test () securityfocus com Subject: RE: PGP 9.0 : Not sure if it was just rumor or not, but I heard this happened as a : result of 9-11. Apparently the terrorists' were using the freeware : version of PGP to encrypt their communications with each other. I may be : wrong, but I'm sure that's what I heard. Maybe making it a commercial : version can not only generate revenue, but possibly help enforce import : and export laws on the software. : : Regards, : : John : John, I sure as hope that 9/11 didn't have anything to do with it. I mean yes PGP can be "used" against us by those trying to hurt us by encrypting their communications. But taking away the software via a 30 day limit really isn't the answer. As there are PLENTY of sites where one can obtain license/registration numbers. Not to mention that the "easiest" way around a license/registration number/trial license is to simply back up all of the data on the computer on which it's installed, reformat, and re-installing the software. Although IF more people would make use of PGP (or some other form of encryption software) it would render Echelon all but useless. . . Herman Live Long and Prosper ___________________ _-_ \==============_=_/ ____.---'---`---.____ \_ \ \----._________.----/ \ \ / / `-_-' __,--`.`-'..'-_ /____ ||- `--.____,-' -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 iQA/AwUBQ78avh/i52nbE9vTEQKrSgCdFWgR/WidF2P0uEqVdRtz8s4mvYoAoLay PG5yPl6vf7t7kXO9PigCS7PD =V6sl -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- PGP 9.0 kuffya (Jan 06)
- RE: PGP 9.0 Andy Meyers (Jan 06)
- RE: PGP 9.0 Ebeling, Jr., Herman Frederick (Jan 07)
- RE: PGP 9.0 Kyle Starkey (Jan 14)
- <Possible follow-ups>
- RE: PGP 9.0 Smith, Michael J. (Jan 06)
- Re: PGP 9.0 David M. Zendzian (Jan 06)
- RE: PGP 9.0 John E. Fleming (Jan 06)
- Re: PGP 9.0 RsH (Jan 06)
- Re: PGP 9.0 Dave Dearinger (Jan 07)
- RE: PGP 9.0 Ebeling, Jr., Herman Frederick (Jan 07)
- RE: PGP 9.0 metajunkie (Jan 07)
