home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Freaks Macintosh Archive
/
Freaks Macintosh Archive.bin
/
Freaks Macintosh Archives
/
Crypto⁄Encryption
/
PGP
/
PowerMac601 PGP 2.6.3i.sit
/
PowerMac601 PGP 2.6.3i
/
PowerMac PGP 2.6.3iC15_601.rsrc
/
STR#_203.txt
< prev
next >
Wrap
Text File
|
1997-03-06
|
7KB
|
297 lines
À⌘
À
À
À
À
À
À
À
À
À
À
À
À
À
À
À
À
À
bottom of the menu to scroll up or down.
table of contents is a scrolling menu. Click on the triangles at the top and
section title in the table of contents on the right side of the window. The
You can quickly jump to any section of the manual by clicking on the
key on the extended keyboard).
keys while pressing the up or down arrow key (or use the Home or End
the beginning or end of the manual, hold down both the command and shift
use the Page Up or Page Down key on the extended keyboard). To jump to
hold down the command key while pressing the up or down arrow key (or
your keyboard has these keys). To scroll up or down one screen at a time,
keys to scroll the manual backwards or forwards one line at a time (if
In addition to using the scroll bar, you can also use the up and down arrow
Use the scroll bar to scroll through the manual.
equivalent.
"Help" command in the Apple menu or by the Command-H keyboard
This window displays the manual you are reading now. It is opened by the
åThe Help Window
This section describes some of the MacPGP windows.
åWindows
a growing social need for it. That's why I wrote it.
PGP empowers people to take their privacy into their own hands. There's
public-key cryptographic technology. Until now.
organizations mostly have not had access to affordable "military grade"
other corporate giants. But ordinary people and grassroots political
arms and drug traffickers. So do defense contractors, oil companies, and
agencies have access to good cryptographic technology. So do the big
If privacy is outlawed, only outlaws will have privacy. Intelligence
forms of cryptography.
completely effective, the next logical step would be to outlaw other
traffic only when duly authorized by law. Of course, to make Clipper
Government promises that they will use these keys to read your
to keep a copy, placed in escrow. Not to worry, though-- the
chip will be loaded with its own unique key, and the Government gets
voice products. The catch: At the time of manufacture, each Clipper
secure FAX, etc. AT&T is now putting the Clipper into their secure
it into all their secure communication products, like secure phones,
algorithm. The Government is encouraging private industry to design
"Clipper" chip, containing a new classified NSA encryption
this initiative is a Government-built encryption device, called the
administration, and unveiled April 16th, 1993. The centerpiece of
initiative, under development at NSA since the start of the Bush
Most alarming of all is the White House's bold new encryption policy
1994.
Congress in 1992 because of citizen opposition, it was reintroduced in
from FBI offices. Although it never attracted any sponsors in
the FBI to remotely wiretap all forms of electronic communication
equipment to build in special remote wiretap ports that would enable
Congress. It would require all manufacturers of communications
In 1992, the FBI Digital Telephony wiretap proposal was introduced to
toward similar objectives.
Government has since introduced other disturbing legislation to work
rigorous protest from civil libertarians and industry groups. But the
appropriately authorized by law." This measure was defeated after
plain text contents of voice, data, and other communications when
insure that communications systems permit the Government to obtain the
manufacturers of electronic communications service equipment shall
Congress that providers of electronic communications services and
read anyone's encrypted messages. It reads: "It is the sense of
insert special "trap doors" in their products, so that the Government can
would have forced manufacturers of secure communications equipment to
measure buried in it. If this non binding resolution had become real law, it
Senate Bill 266, a 1991 omnibus anti-crime bill, had an unsettling
their own protective measures.
Probably most people will trust that. But perhaps some people will prefer
protect our E-mail with Government-designed encryption protocols.
everyone, not the novelty it is today. Perhaps the Government will
increasingly ubiquitous personal computers. E-mail will be the norm for
high capacity fiber optic data networks linking together all our
We are moving toward a future when the nation will be crisscrossed with
scanned this way on a large scale by the NSA.
and undetectably on a grand scale. International cablegrams are already
interesting keywords. This can be done easily, routinely, automatically,
paper mail. E-mail messages are just too easy to intercept and scan for
electronic channels. Electronic mail will gradually replace conventional
More and more of our private communications are being routed through
cases when it seems worthwhile.
monitoring is not practical on a large scale. This is only done in important
transcribe spoken telephone conversation. This kind of labor-intensive
intercept and steam open and read paper mail, and listen to and possibly
citizens, it has to expend a certain amount of expense and labor to
Today, if the Government wants to violate the privacy of ordinary
encryption. Think of it as a form of solidarity.
so that no one drew suspicion by asserting their E-mail privacy with
everyone routinely used encryption for all their E-mail, innocent or not,
envelope. There's safety in numbers. Analogously, it would be nice if
envelopes. So no one draws suspicion by asserting their privacy with an
that kind of world, because everyone protects most of their mail with
would open his mail to see what he's hiding. Fortunately, we don't live in
envelope for his mail, it would draw suspicion. Perhaps the authorities
for their mail? If some brave soul tried to assert his privacy by using an
What if everyone believed that law-abiding citizens should use postcards
their E-mail?
maybe a paranoid nut. Do law-abiding citizens have any need to encrypt
a subversive or a drug dealer if you hide your mail inside envelopes. Or
searches of your house? Are you trying to hide something? You must be
submit to drug testing on demand? Why require a warrant for police
then why don't you always send your paper mail on postcards? Why not
unwarranted. If you really are a law-abiding citizen with nothing to hide,
Perhaps you think your E-mail is legitimate enough that encryption is
Constitution.
wrong with asserting your privacy. Privacy is as apple-pie as the
(E-mail) or confidential documents read by anyone else. There's nothing
but is. Whatever it is, you don't want your private electronic mail
affair. Or you may be doing something that you feel shouldn't be illegal,
be planning a political campaign, discussing your taxes, or having an illicit
It's personal. It's private. And it's no one's business but yours. You may
By Phil Zimmermann
åWhy Do You Need PGP?