PGP is short for Pretty Good Privacy. It is encryption for the private things you want to keep that way and about as good as it gets for us, the peasant masses down trodden as we are by corrupt governments milking us for all we are worth. Sadly things work as they could have done. But we have second chance. Germans have produced GPG, which uses the same mathematical advances while still being open source. This means you can read the source code for yourself to see if there are any back doors for government spies to abuse. That is as good as it gets in this foul Year of Our Lord. 2013. Use it to send you emails that you want to keep private.
PGP Has a Hole
Doctor Grabbe explains all. If you know about it you can beat this pit fall.
The PGP Word List ('Pretty Good Privacy word list', also called a biometric word list for reasons explained below) is a list of words for conveying data bytes in a clear unambiguous way via a voice channel. They are analogous in purpose to the NATO phonetic alphabet used by pilots, except a longer list of words is used, each word corresponding to one of the 256 unique numeric byte values.
The PGP Word List was designed in 1995 by Patrick Juola, a computational linguist, and Philip Zimmermann, creator of PGP. The words were carefully chosen for their phonetic distinctiveness, using genetic algorithms to select lists of words that had optimum separations in phoneme space........
The Zimmermann/Juola list was originally designed to be used in PGPfone, a secure VoIP application, to allow the two parties to verbally compare a short authentication string to detect a man-in-the-middle attack (MiTM). It was called a biometric word list because the authentication depended on the two human users recognizing each other's distinct voices as they read and compared the words over the voice channel, binding the identity of the speaker with the words, which helped protect against the MiTM attack.
It is an interesting idea but not very useful.
Misdirecting An Enemy
Lots of encrypted rubbish makes it difficult for them.
MIT Public Key Registry
MIT has a list of public keys. You can add yours to it.
The NSA, Crypto AG And Fraud
They cheat. It is that simple. Breaking encryption by purely technical means is much more difficult. That is why they have lots of men with heavy duty qualifications in maths, especially number theory. Being able to break in is quicker and easier.
Has more on other aspects of keeping YOUR data to yourself.
Window Version of GPG
The Linux version of PGP has been ported over to Windows. It runs on Vista, the new version of Windows that has the compatibility problems built in to screw you. It is open source and subject to checking by anyone with time and a good background. AND it is a freebie. Get it while you can from:-
then make sure that you have a good copy with a signature from:-
PGP Encryption Beats Criminal Investigators So It Is Back To Basics And Torture [ 10 February 2008 ]
BURLINGTON, Vt. (AP) When Sebastien Boucher stopped at the U.S.-Canadian border, agents who inspected his laptop said they found files containing child pornography [ but they lied - Editor ].......... Now Boucher is caught in a cyber-age quandary: The government wants him to give up the password, but doing so could violate his Fifth Amendment right against self-incrimination by revealing the contents of the files.
Secret Squirrel, the NSA, GCHQ et cetera are another issue. The answer to that question is classified TOP SECRET or higher. They would probabbly claim that it was not torture. Boucher was guilty as Hell.
MPs Told Not To Use PGP Encryption [ 4 March 2009 ]
& omissions, broken links,
cock ups, over-emphasis, malice [ real or imaginary ] or whatever; if
you find any I am open to comment.
Email me at Mike Emery. All financial contributions are cheerfully accepted. Home
Updated on Saturday, 23 November 2013 22:15:51