Anonymous wrote:
> 
> Now that the PGP key management "bug" is public, I'd like to comment
> on some source code issues and follies.
> 
> The source for versions in question (starting from 5.*) has been available
> for more than two years.
> 
> While many crypto experts intensely bullshit about the importance
> of the source code to counter "security through obscurity", it appears
> than none really looked at the sources closely.

A-Yup.  But those who hid, overlooked it.

One thing that I have found weird about PGP 6.x is that it insists on
installing itself as both a network driver and as one of those windows
cute toys that lives in the system tray.

The big problem with this is that I store my ring on an encrypted disk
which isn't mounted when NT starts up anyway, so it fails to start up.
I suppose if I wanted to bother, I could buy a Windblows compiler and
"fix" this.

While the VPN functionality of PGPNet might be useful, I find it a bit
cumbersome.  This might be why it was thrown in.  Perhaps so as to 
force you to install it on a normal drive, so your keyring might be
accessible.  So for me, the net result is that I don't use the VPN
features.

The usual warnings about trusiting binaries apply of course.  How does
anyone know that the binary called PGP 6.5 Freeware or 6.5i doesn't
contain backdoors or key generation flaws?  But we've discussed that
to death already.

-- 
----------------------Kaos-Keraunos-Kybernetos---------------------------
 + ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\
  \|/  :aren't security.  A |share them, you don't hang them on your/\|/\
<--*-->:camera won't stop a |monitor, or under your keyboard, you   \/|\/
  /|\  :masked killer, but  |don't email them, or put them on a web  \|/
 + v + :will violate privacy|site, and you must change them very often.
[EMAIL PROTECTED] http://www.sunder.net ------------

Reply via email to