À⌘ À À À À À À À À À À À À À À À À À  bottom of the menu to scroll up or down. table of contents is a scrolling menu. Click on the triangles at the top and section title in the table of contents on the right side of the window. The You can quickly jump to any section of the manual by clicking on the  key on the extended keyboard). keys while pressing the up or down arrow key (or use the Home or End the beginning or end of the manual, hold down both the command and shift use the Page Up or Page Down key on the extended keyboard). To jump to hold down the command key while pressing the up or down arrow key (or your keyboard has these keys). To scroll up or down one screen at a time, keys to scroll the manual backwards or forwards one line at a time (if In addition to using the scroll bar, you can also use the up and down arrow  Use the scroll bar to scroll through the manual.  equivalent. "Help" command in the Apple menu or by the Command-H keyboard This window displays the manual you are reading now. It is opened by the  åThe Help Window  This section describes some of the MacPGP windows.  åWindows   a growing social need for it. That's why I wrote it. PGP empowers people to take their privacy into their own hands. There's  public-key cryptographic technology. Until now. organizations mostly have not had access to affordable "military grade" other corporate giants. But ordinary people and grassroots political arms and drug traffickers. So do defense contractors, oil companies, and agencies have access to good cryptographic technology. So do the big If privacy is outlawed, only outlaws will have privacy. Intelligence  forms of cryptography. completely effective, the next logical step would be to outlaw other traffic only when duly authorized by law. Of course, to make Clipper Government promises that they will use these keys to read your to keep a copy, placed in escrow. Not to worry, though-- the chip will be loaded with its own unique key, and the Government gets voice products. The catch: At the time of manufacture, each Clipper secure FAX, etc. AT&T is now putting the Clipper into their secure it into all their secure communication products, like secure phones, algorithm. The Government is encouraging private industry to design "Clipper" chip, containing a new classified NSA encryption this initiative is a Government-built encryption device, called the administration, and unveiled April 16th, 1993. The centerpiece of initiative, under development at NSA since the start of the Bush Most alarming of all is the White House's bold new encryption policy  1994.  Congress in 1992 because of citizen opposition, it was reintroduced in from FBI offices. Although it never attracted any sponsors in the FBI to remotely wiretap all forms of electronic communication equipment to build in special remote wiretap ports that would enable Congress. It would require all manufacturers of communications In 1992, the FBI Digital Telephony wiretap proposal was introduced to  toward similar objectives. Government has since introduced other disturbing legislation to work rigorous protest from civil libertarians and industry groups. But the appropriately authorized by law." This measure was defeated after plain text contents of voice, data, and other communications when insure that communications systems permit the Government to obtain the manufacturers of electronic communications service equipment shall Congress that providers of electronic communications services and read anyone's encrypted messages. It reads: "It is the sense of insert special "trap doors" in their products, so that the Government can would have forced manufacturers of secure communications equipment to measure buried in it. If this non binding resolution had become real law, it Senate Bill 266, a 1991 omnibus anti-crime bill, had an unsettling  their own protective measures. Probably most people will trust that. But perhaps some people will prefer protect our E-mail with Government-designed encryption protocols. everyone, not the novelty it is today. Perhaps the Government will increasingly ubiquitous personal computers. E-mail will be the norm for high capacity fiber optic data networks linking together all our We are moving toward a future when the nation will be crisscrossed with  scanned this way on a large scale by the NSA. and undetectably on a grand scale. International cablegrams are already interesting keywords. This can be done easily, routinely, automatically, paper mail. E-mail messages are just too easy to intercept and scan for electronic channels. Electronic mail will gradually replace conventional More and more of our private communications are being routed through  cases when it seems worthwhile. monitoring is not practical on a large scale. This is only done in important transcribe spoken telephone conversation. This kind of labor-intensive intercept and steam open and read paper mail, and listen to and possibly citizens, it has to expend a certain amount of expense and labor to Today, if the Government wants to violate the privacy of ordinary  encryption. Think of it as a form of solidarity. so that no one drew suspicion by asserting their E-mail privacy with everyone routinely used encryption for all their E-mail, innocent or not, envelope. There's safety in numbers. Analogously, it would be nice if envelopes. So no one draws suspicion by asserting their privacy with an that kind of world, because everyone protects most of their mail with would open his mail to see what he's hiding. Fortunately, we don't live in envelope for his mail, it would draw suspicion. Perhaps the authorities for their mail? If some brave soul tried to assert his privacy by using an What if everyone believed that law-abiding citizens should use postcards  their E-mail? maybe a paranoid nut. Do law-abiding citizens have any need to encrypt a subversive or a drug dealer if you hide your mail inside envelopes. Or searches of your house? Are you trying to hide something? You must be submit to drug testing on demand? Why require a warrant for police then why don't you always send your paper mail on postcards? Why not unwarranted. If you really are a law-abiding citizen with nothing to hide, Perhaps you think your E-mail is legitimate enough that encryption is  Constitution. wrong with asserting your privacy. Privacy is as apple-pie as the (E-mail) or confidential documents read by anyone else. There's nothing but is. Whatever it is, you don't want your private electronic mail affair. Or you may be doing something that you feel shouldn't be illegal, be planning a political campaign, discussing your taxes, or having an illicit It's personal. It's private. And it's no one's business but yours. You may  By Phil Zimmermann åWhy Do You Need PGP?