Originally posted by c0nv3r9
I know this has been discussed somewhat pre-dc10... but this puts an interesting twist on it, imo. What forms of encryption do you tend to stick with blackwave? others? How much faith are you willing to put into PGP?
I know this has been discussed somewhat pre-dc10... but this puts an interesting twist on it, imo. What forms of encryption do you tend to stick with blackwave? others? How much faith are you willing to put into PGP?
I use crypto on my:
external drives (pgpdisk over ntfs/efs (with offloaded keys))
usb keys (using pgpi pgpdisk)
email (pgpi/hushpgp)(s/smime)
communications (ssh)
... the thing about crypto is that most people don't have the time or the requirement to go over the implementation of the algos or the algos themselves... but soley rely on the advice of acclaimed cryptographers/cryptologists/cryptanalysts...
check out www.cryptome.org and subscribe to counterpane'scryptogram.
PGPi can be found here: http://www.pgpi.org/
I have not used PGP 8 from http://pgp.com/
I use hushmail (http://www.hushmail.com/) they have a nice antispam feature (that at least works for now)... you can block all non crypto-email... now i am just waiting for crypto-wrapping spam bots... <looking around nervously>
... here is a fun site: http://www.spammimic.com/
regarding Winn's example, it takes two to tango in using communications crypto since if one of the entities drop the ball, it doesn't matter who dropped it... it has been dropped. :)
... in the end remember two things:
Crypto is not meant to STOP anyone from knowing the data... just slow them down until the data invalidates, no longer becomes important.
Crypto is usually exploited not through the algos, but the implementations of the algos and various bad programming techniques and security practices.
I think crypto is a nice burden to use.
Comment