home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Monster Media 1994 #1
/
monster.zip
/
monster
/
FREQ_QA
/
PGP1.ZIP
/
00000163.TXT
Wrap
Text File
|
1994-03-15
|
46KB
|
701 lines
Uï∞ü∞WVìF≡PÜ(αâ─ìF≡PÜ0αâ─Ä┬ï╪ï√îF÷&èO╕╙αëF°&ïGï╚&ïG║ï≥Ö≈■╛<ï┴ï╩ï╨ï┴ëå⌠■ï┬Ö≈■ï╞ï╩≈«⌠■ï≡±╗Ä$6ë₧·■îåⁿ■&╟ ╗~Ä&6ë₧÷■îå°■&ïÄF÷&9EtLÉΦ2╕pP3└P ╢°■ ╢÷■Üαâ─ÄF÷&ïE─₧÷■&ëÄ(6&â>ptÄ*6&â>vt
Ü£┘ÜT┘ÄF÷& E╟F·Ä,6&â>Θ▀ë~⌠╟F■╕⌠╣ùëå≡■ëÄ≥■ëvⁿïFⁿ─₧≡■&─^■ë₧∞■îåε■&9~ΘÖï├î┬ì~öï≤Ä┌╣-≤ÑñèFó*ΣàF°tz8f╥tèF╥─^⌠&8GuiÇ~╤tèF╤─^⌠&8GuWïFⁿ+Fö;Fû| ïFⁿ9Föuâ~ût÷Fÿ@t8èFú─^⌠&8Gt,ïFⁿ+Fö;Fû~<Ä.6&â>t0─^⌠&èG─₧≡■&─ïv■&ê@âF■[ F·ïF·Ä,6&9~Θ2 Θ⌡èFú─^⌠&8Gu÷FÖu╙ïv·Θzïv·─₧·■&ë7╗XÄ06ë₧Φ■îåΩ■&─?& ╡& ╡Ü£┘â─ìDP─₧Φ■&─& ╖╥& ╖╨Ü┌α â─Ä26&â>|uÄ46&╟zÄ66&╟¬─^⌠&èGï╚ï╞╗[≈δï╪Ä86&─>⌠&êIÄ86&─⌠ï°&Ça■ÉΦÇ~¿t;èF¿*ΣP─₧Φ■&─& ╖╓& ╖╘Ü┌α â─Ä46&╟zèF¿*ΣPܵ┘â─ΘvÄ:6&í▓&░uΘdÄ26&â>|uÄ46&╟z─₧Φ■&─& ╖┌& ╖╪Ü┌α â─Ä<6& 6¿& 6ªÜ`┘â─Üû┘ܼα ╕PÜ,╣â─Ä>6&íF&ïHëåΣ■ëûµ■╨t8 ╢µ■Pìå■■PÜ╝
αâ─÷|ìF▒Pìå■■PÜh
αâ─ìå■■PÜ╠┘â─Ä:6& 6▓& 6░ìå■■PÜ╝
αâ─÷|ìF▒Pìå■■PÜh
αâ─ìå■■PÜ╠┘â─Ä*6&â>vtܼα Ü«┘ÜB┘Ül┘░P░PÜ╢] â─Ä@6& 6á& 6₧Ü`┘â──₧Φ■&─& ╖▐& ╖▄Ü┌α â─╕pPÜ╒ â─ÄB6&úR&ëT─₧·■&ë7ïF₧ÄD6&úïFáÄF6&ú Üf┘─₧·■&ë7÷FÿtÄH6&Ç&│ÄJ6&╞ƒδÉÄH6&Ç│ÇÄJ6&╞ƒèfÖ%=└≈╪ÄL6&úïF₧ÄD6&úïFáÄF6&ú ^_ïσ]╦ÉUï∞ü∞▐VÄN6& 6 & 6ìår PÜ╝
αâ─ÄN6& 6 & 6ìå" PÜ╝
αâ─╕vPìår PÜh
αâ─╕éPìå" PÜh
αâ─ìFαPìår PÜXXαâ─@uΘNìF┬Pìå" PÜXXαâ─@uQÄN6& 6 & 6ìå" PÜ╝
αâ─ÄP6& 6(& 6&ìå" PÜh
αâ─ìF┬Pìå" PÜXXαâ─@uΘτïF≥ïV⌠9V╓vΘ┘r9F╘vΘ╧â~≡}Θ╞ â~ε[sΘ╗╕ÇPìår PܬCαâ─ï≡â■ uΘƒ╞år ╕Pìår PVÜj3αâ─ 6d 6bìår PÜ°
αâ─└ud╕pP╕~╣ùQPVÜj3αâ─ìF■PïFε-ÇPÄ86& 6÷& 6⌠VÜPαâ─ÄR6&╟╕[ÖRPïFεïV≡-Çâ┌RPÜ║αÄ,6&úVÜ╚2αâ─^ïσ]╦Uï∞ü∞╘WV+└PPÜ(αâ─ëFⁿëV■ÄN6& 6 & 6ìFäPÜ╝
αâ─ÄN6& 6 & 6ìå4 PÜ╝
αâ─╕ÄPìFäPÜh
αâ─╕ÜPìå4 PÜh
αâ─ìF╘Pìå4 PÜXXαâ─@uQÄN6& 6 & 6ìå4 PÜ╝
αâ─ÄP6& 6(& 6&ìå4 PÜh
αâ─ìF╘Pìå4 PÜXXαâ─@uΘ3ïFµïVΦ9V■w1r9Fⁿs*ëF≥ëV⌠ëF÷ëV°Ä06&─X& ╖Γ& ╖αÜ┌α â─δÉïFⁿïV■ëF≥ëV⌠ëF÷ëV°╕ÇP╕üPìFäPܬCαâ─ï≡â■ uΘ╞╕P 6d 6bVÜh4αâ─╕pP╕~╣ùQPVÜh4αâ─3 ╗Ä,6ë₧0 îå2 &9?~Dëvⁿ3╔ëN■ï±╕ùÄ╪─⌠▐â├ë₧, îå. &÷Gt&÷u&Çg■â╞[G─₧0 &9?╨ïvⁿìF·P╕[─₧0 &≈/PÄ86& 6÷& 6⌠VÜWαâ─VÜ╚2αâ─ìF≥PìFäPÜ«Rαâ─^_ïσ]╦ÉUï∞â∞TWVÄN6& 6 & 6ìF¼PÜ╝
αâ─╕ªPìF¼PÜh
αâ─╕▓PìF¼PÜ¿αâ─ï≡ëV■╨t)ïF■PV╣Q╣pQ╣~║ùRQï°Üxαâ─WVܪαâ─^_ïσ]╦ÉUï∞â∞"WVìFΦPÜ(αâ─ìFΦPÜ0αâ─ï°ëVε╕<Ä┬&≈m&EëF⌠ÄT6&╟ ÄFε&èM╕╙αëF≡╟F÷╕& E╟F·ë~∞Ä,6&íëFµ└Θ╔Ä86&í⌠&ï÷ï╪ëV■Ä$6&íëFΣïN·╕╘Ä╪9NΣuΘïâ~t ÄF■&÷u|─v∞&èDÄF■&8Gtl&èG
*ΣàF≡ta&èG:êFΓ
└tÄFε&èD8FΓuJÄF■&èG9êFα
└tÄFε&èD8Fαu0ÄF■ìwⁿ&ïëF▐;F⌠ÄF■&÷@t┐δï°+~⌠9~÷~ë~÷ëâ├[A9Nµ~Θa ü~÷í}Θ╡╕á+F⌠ëF≥╤f≡â~≡@~╟F≡3╔9NµΘöÄ86&í⌠&ï÷>ï╪ëV■ï~∞╕╘Ä╪â~tÄF■ìw╞&÷uZÄF■ìw╨&è*ΣàF≡tJÄF■&èêFΓ
└t ÄFε&8Eu4ÄF■ìw &èêFα
└t ÄFε&8EuÄF■ìw┬&ïF≥ëF°;F÷}ëF÷ëâ├[A9Nµïü~÷áïV÷δ║áâ~tâ·}║ï┬^_ïσ]╦Éear all searchUï∞ü∞╢WV╕╚Pܬαâ─ï≡ëV■╨t5╕╨PÜ6 â─└u$ïF■PVìåV PÜ╝
αâ─ìåV PÜ┘â─δÉ╞åV ╕▄PìåV PÜh
αâ─ìF╓PìåV PÜXXαâ─└t$ìåV P╕ΦP╕╠(PÜ─αâ─╕·PÜ≤αâ─ï~ΣW╕PÜαâ─ï≡ëV·╨u╕P╕╠(PÜ─αâ─╕·PÜ≤αâ─╕P╕-PìåV PÜ26 â─
ëFⁿëV■╨u$ìåV P╕0P╕╠(PÜ─αâ─╕·PÜ≤αâ─ v■ vⁿW╕P v·VÜαâ─;╟t2ìåV P╕LP╕╠(PÜ─αâ─ v■ vⁿܪαâ─╕·PÜ≤αâ─ v■ vⁿܪαâ─└t$ìåV P╕wP╕╠(PÜ─αâ─╕·PÜ≤αâ─ïF·╗
Ä 3ë₧R îåT &ë7&ëGìL╗XÄ"3ë₧N îåP &ë&ëGÄ└&ï<ü pt#╕pPW╕ÖP╕╠(PÜ─αâ─╕·PÜ≤αâ──₧N &ï&ïWï╧╤ß╤ß┴ï≡ëVⁿ╟F°â ~>║ìM ëV■ëv·ë~÷ï≥ï~·╕ùÄ╪ÄZïX&ï&+╟ïVⁿ&ë&ëPâ╞IuΣïv·─₧N &─ïFⁿ&ë7&ëG─₧R &─&ï╤α╤α&G├î┬ï°ëV÷ï╪&ïÄ$3&ú· â╟ï┬&ë>
&ú
&ï· ╤π╤π▀Ä┬&ïÄ&3&ë║ìOëF÷&ë└&ú┬&ï║╤Γ╤Γ╩ï∙╗HÄ(3ë₧J îåL &ë&ëGâ┴Ä*3&ë┤&ú╢ÄF÷&ï╤Γ╤Γ╩ï±ëFⁿPQÜ"αâ─@≡╟F°─₧J &─&â?~Gë~⌠║ëV■ëv·ï≥ïN°ï~·╕ùÄ╪─┤&ï&+╟ïVⁿ&ë&ëPâ╞A─₧J &─&9┌ï~⌠ïv·Ä*3&─┤ïFⁿ&ë7&ëG─₧J &─&ï@╤α╤α&G°ïF÷Ä,3&ë>ä
&úå
ìMÄ.3&ë▄&ú▐╕^_ïσ]╦ÉëF°┐Ä■7&âUï∞â∞.WVÜ4┘ÄZ9&╟3└Ä\9&ú6Ä^9&ú"Ä`9&ú╓Äb9&úrÄd9&ïbÄf9&ëdÄh9&ïfÄj9&ëh+╔ëN÷ëN⌠ v vÜZ α â─RP╕╠"P╕r╣ùQPÜααâ─╕÷╣ùïVï^ï±Vï°ï≥Ä┴Ä█╣≤Ñ^║╢╣ùëV≡ëN≥Vï·ï≡Ä┴╣≤ÑÄl9&â>nu-Än9&─X& ╖B& ╖@Ü┌α â─╕╧"PÜ|α â─3└Θb╕r╣ùQPÜÆ┘â─└tτï~
Θ╛╕P v≥ v≡PÜ┘â─└t!2└P░PÜ╢] â─Äp9&àÜt¡ÜN┘δªÉ2└P░PÜ╢] â─Äp9&àÜuÜ╬┘╕,
╣ùQPÜ╚┘â─2└P░PÜ╢] â─Äp9&àÜuΘ0 ~+└PPÜ(αâ─ëF⌠ëV÷╕PÜⁿ┘â─+└PPÜ(αâ─ï╚ï┌+F⌠V÷Ä~9&ú║&ë╝SQ v÷ v⌠ï≡ï∙ëvΓëVΣï≤Ürα â─ëFⁿëV■Ä~9&Ω&∞╣d3█SQRPÜåαëF°ëV·╕dÖRP v■ vⁿÜ║αëFⁿëV■ v· v°RP╕<ÖRP╣─ ╗ SQ╕ÖRP vΣ vΓÜ║αRPëF▐ëVαÜTα╣─ ╗ SQ vα v▐ëF┌ëV▄ÜTα╣<3█SQ vΣ vΓëF╓ëV╪Ü║αF╓V╪ïN┌ï^▄+╚┌SQëF╥ëV╘ÜTα╟╓+F⌠V÷RP v╘ v╥ vα v▐ v vÜZ α â─RPÄn9&─X& ╖r& ╖pÜ┌α â─ÜN┘Ä~9& å╗pÄr9ë^µîFΦ&â?tÄt9&â>vtÜ£┘Ü÷┘─^µ&â?t;Ä^9&â>"uÄ\9&â>6uÄ`9&â>╓t╕ P v vÜ╪┘â─ÉΦé─^µ&â?tMÄt9&â>vtA╕P╕PÄv9& 68& 66Ü`┘â─╕PÄx9&áGPÄv9& 68& 66Ü≡┘â─╕Θå tΘ╣╕╘Ä╪╕[≈.ï╪╕ùÄ└&í⌠&ï÷Ä┬╪îFε&÷GÇt1&9}&ïG≈╪╣ùÄ┴&;z
~3└Θ6╕ùÄ└&íz
ÄFε&9G|τ╕╘Ä└&íëFΩ└u╕╘Ä└&â>tÄFε&÷Gu╕ùÄ└&÷Ç
t│â~Ωu╕╘Ä└&â>tÄFε&÷Gt╕ùÄ└&÷Ç
uë╕P v≥ v≡PÜ┘â─└tΘ}ⁿÜ╬┘╗pÄr9ë^µîFΦ&â?tMÄt9&â>vtA╕P╕PÄv9& 68& 66Ü`┘â─╕PÄx9&áJPÄv9& 68& 66Ü≡┘â─+└PPÜ(αâ─ëF⌠ëV÷Äz9&â>|uÄ|9&╟z╕,
╣ùQPÜî┘â─ï≡÷|Θ%ⁿ─^µ&â?tMÄt9&â>vtA╕P╕PÄv9& 68& 66Ü`┘â─╕PÄx9&áGPÄv9& 68& 66Ü≡┘â─╕P v≥ v≡╕PÜ┘â─ï╞ΘÆÄn9&─X& ╖F& ╖DÜ┌α â─╕P v≥ v≡╕PÜ┘â─Är9&â>ptMÄt9&â>vtA╕P╕PÄv9& 68& 66Ü`┘â─╕PÄx9&áGPÄv9& 68& 66Ü≡┘â─Ü÷┘╕^_ïσ]╦Uï∞â∞WV╕P3└ÄZ9&úP╕÷╣ùQPÜαâ─ÄÇ9+└&ú&ú■ï~ u1Äé9&9>"t2└P░PÜ╢] â─Äp9&àÜuÜ|] ÷─uΘ╗Ää9&╟Äå9&íëF·└|#╕[≈n·ï≡Äê9&─⌠&÷@tÄä9&╟2└P░PÜ╢] â─= tΘ╨Äz9&â>|uÄ|9&╟zÄr9&â>ptÄt9&â>vtÜT┘Äé9&â>"t2└P░PÜ╢] â─Äp9&àÜtΘ t╛3 δÉ╕⌠PÜ▐┘â─ï≡â■tΘéÄè9&íN&Lts╕dPÜ╒ â─ëFⁿëV■Ü|] ÷─t6ë~ v■ vⁿÜ`╒ â─└u!╕dPÜ╒ â─ëFⁿëV■Üè] Ü|] ÷─u═Ü°] 3└PÄè9& 6N& 6LÜ└┘â─ΘΩ■â■tm╕pPÜ╒ â─ëFⁿëV■RPÜ`╒ â─└tΘP■ë~Ü|] ÷─tΘ@■2└P░PÜ╢] â─= tΘ*■Ü─α v■ vⁿÜ`╒ â─└t╞Θ■Ü─α 3└δbÉ2└P░PÜ╢] â─Äp9&àÜt;3└PÜⁿ┘â─ÜN┘Ä^9&â>"uÄ\9&â>6uÄ`9&â>╓tÉΦδÜN┘ÉΦ(╕^_ïσ]╦ÉUï∞ü∞·WV╗Äå9ë₧
îå &â?|%╕[&≈/Äê9&⌠&ï÷ì~ñï≡Ä┌╣-≤Ññ─₧
&â?}ΘÄÄ^9&â>"t5Ç~║t/èF║*ΣPÄn9&─X& ╖N& ╖LÜ┌α â─èF║*ΣPÉΦⁿâ─3÷ì~πÄî9&Ç╝&t1èB╗*ΣPWÄn9&─X& ╖R& ╖PÜ┌α â─
èB╗*ΣPÉΦ║â─Fâ╟ìF√;°r╕╗╓Ä`9ë₧ îå &â?uÄ\9&â>6t?─₧
&â?|5Ç~╣t/èF╣*ΣPÄn9&─X& ╖V& ╖TÜ┌α â─èF╣*ΣPÉΦOâ─ÄÄ9&í▓&░uΘ─₧ &â?uÄ\9&â>6uÄ^9&â>"uΘ⌡Än9&─X& ╖Z& ╖XÜ┌α â─ÄÉ9& 6¿& 6ªÜ`┘â─Üû┘ܼα ╕PÜ,╣â─ÄÄ9& 6▓& 6░ìå PÜ╝
αâ──₧
&â?|ìF┴Pìå PÜh
αâ─Ü╥┘ìå PÜ╠┘â─Ü╞┘░P░PÜ╢] â─Än9&─X& ╖^& ╖\Ü┌α â─ÄÆ9& 6á& 6₧Ü`┘â─Ü┘╕pPÜ╒ â─Äö9&úR&ëT3└Ä^9&ú"Ä\9&ú6─₧ &ë^_ïσ]╦ÉUï∞ÜÇ┘╕╨"PÄû9& 6°& 6÷Än9&─X& ╖å& ╖äÜ┌α ïσÄÉ9& 6¿& 6ªÜ`┘ïσÜû┘Ät9&â>vtÄÿ9& 6╕3└PÜ≥] ïσÄÜ9&â>LtÜr╣Ä£9&â>duÜ.] vÜ≤αïσ]╦Uï∞Vïv÷u3└Öδ,Ü─αï╚ï╞Ö+┬╤°ìTï╪ï┴ï╩Ö≈∙ï┬├╣d≈ΘPÜ╒ â─^ïσ]╦ÉUï∞â∞WVï~Ä₧9&íB&ïDÄF&9Eu &9U
uΘ&ïE
&EuΘÄá9&─α&╞Äó9& 6▐& 6▄╕╞KPÜ╝
αâ─╕╞KPÜ"αâ─╞KëF÷î^°╟F■Äñ9&í&uΘ╗ï~■─N╕ùÄ╪ï±ïïW&9Du&9T
tGâ├ïGuΓΘφÉĪ9ï▀╤π╤π&ïç╢&ïù╕ëV⌠╨uΘ╠ïV⌠ï≡ëVⁿÄ┬ï▐&Ç?u$ï~÷Ä¿9&â>t3╕┌"P v°WÜααâ─ΘùÉï~÷Ä^ⁿÄF°ï▐Fèï▀G&êÇ<u≡δ┬É─^& 7╕▄"P v°Wδ_ÉĬ9& 6╓& 6╘╕╞KPÜ╝
αâ─╕╞KPÜ"αâ─╞Kï≡î^°Ä¼9&í≡ÄF&9t&Ä¿9&â>uÄF& 5╕π"PìD v°PÜααâ─
╕╞Kî┌^_ïσ]╦ÉUï∞â∞Ät9&â>vuΘ½Är9&â>puΘ£3└PÜ,╣â─Äå9&í@P╕Ω"P╕r╣ùQPÜαα╕
αP╣QÄ«9& 6·& 6°Ü`┘â─╕r╣ùQPÄ«9& 6·& 6°ÜZ┘â─Ä░9&í£@PÄ▓9& 6╛
╕∩"P╕r╣ùQPÜααâ─╕
P╕PÄ«9& 6·& 6°Ü`┘â─╕r╣ùQPÄ«9& 6·& 6°ÜZ┘â─ÉΦΣÄ┤9&íbëF■└t'PÄ╢9& 6& 6╕·"P╕r╣ùQPÜααâ─δ$ÉÄ╢9& 6& 6╕#P╕r╣ùQPÜααâ─╕P╣QÄ«9& 6·& 6°Ü`┘â─╕#PÄ«9& 6·& 6°ÜZ┘â─╕P╕PÄ«9& 6·& 6°Ü`┘â─╕r╣ùQPÄ«9& 6·& 6°ÜZ┘â─3└PÄ╕9& 6^Üα ïσ]╦ÉÄt9&â>vt&Är9&â>pt╕ PÄ║9& 6û& 6öÜÉ┘â─╦ÉUï∞â∞.WVï~╗FLï≤î^·╞ }Θdï╟╣[≈ΘëF╘╗⌠Äê9ë^╓îF╪&─╪&÷Gt╞FLBï╞î┌@ï≡ëV·â~t Ä┬ï╪F&╞ ─^╓&─^╘&÷GtÄF·ï▐F&╞Câ~t
ÄF·ï▐F&╞ ─^╓&─^╘&÷GtÄF·ï▐F&╞Dâ~t
ÄF·ï▐F&╞ â~t$─^╓&─^╘&÷G@tÄF·ï▐F&╞FÄF·ï▐F&╞ ─^╓&─^╘&÷GtÄF·ï▐F&╞Hâ~t
ÄF·ï▐F&╞ ─^╓&─^╘&÷GtÄF·ï▐F&╞Kâ~t
ÄF·ï▐F&╞ ─^╓&─^╘&÷GÇtyÄF·ï▐F&╞Lâ~ti─^╓&─^╘&ïGëF╥└|@P╕+#δÉ╕ +F╥P╕0#PìF┌PÜααâ─
ìF┌î╥ï╚Ä┌ï╪6Ç?t!ëv°ëNⁿï°ï▀Gè─^° F°&êÇ=uφïv°ï~â~t$─^╓&─^╘&÷GtÄF·ï▐F&╞MÄF·ï▐F&╞ ─^╓&─^╘&÷GtÄF·ï▐F&╞Nâ~t
ÄF·ï▐F&╞ ─^╓&─^╘&÷GtÄF·ï▐F&╞Sâ~t
ÄF·ï▐F&╞ ─^╓&─^╘&÷G tÄF·ï▐F&╞Râ~t
ÄF·ï▐F&╞ â~tï^╘─~╓&─=&÷At
ÄF·ï▐F&╞XÄF·&╞╕FLî┌^_ïσ]├ÉUï∞Ät9&â>vuΘ╚Är9&â>puΘ╣Ä╝9&â>≡uÉΦ²3└PÄå9& 6Φ+²ïσRPÄå9&í@P╕5#P╕r╣ùQPÜααïσ╕
P╣QÄ«9& 6·& 6°Ü`┘ïσ╕r╣ùQPÄ«9& 6·& 6°ÜZ┘ïσ╕
P╕PÄ«9& 6·& 6°Ü`┘ïσ v vÄ«9& 6·& 6°ÜZ┘ïσÜT┘ïσ]╦Uï∞ü∞¼WV3└PÜz┘â─ï°╗Ä╛9ë₧` îåb &â?}ΘTÄt9&â>vuΘEÉΦⁿW─₧` &ï@P╛XÄn9ë╢\ îå^ &─& ╖f& ╖dìåd PÜααâ─╕P╕P╗öÄ║9ë₧X îåZ & w& 7Ü`┘â─ìåd P─₧X & w& 7ÜZ┘â─╕P─₧` & 7Φ╦√â─Ä┬ï╪ï≤îF·&Ç?tTï┬PV─₧\ &─& ╖j& ╖hìåd PÜααâ─╕PP─₧X & w& 7Ü`┘â─ìåd P─₧X & w& 7ÜZ┘â─╗╠Ä└9ë₧T îåV &ïG&uΘ9& w& 7ìåd PÜ╝
αâ─╕A#Pìåd PÜh
αâ─╕P╕J#Pìåd PÜ26 â─
ï≡ëV·╨uΘεïF·PV╣QQìN⌠Qï°Üαâ─ëFⁿWVܪαâ─â~ⁿuΘ┐ïvⁿ╤µïr≥─₧T & w& 7ìåd PÜ╝
αâ─╕M#Pìåd PÜh
αâ─3└PìÄd QìN╚QÜ*6 â─
└uqëv■ìFµPÜóαâ─;╞╕Pìåd PìF╚PÜ*6 â─
└t╘δ@É╕2P╕P─₧X & w& 7Ü`┘â──₧\ &─& ╖n& ╖l─₧X & w& 7ÜZ┘â─ÜT┘^_ïσ]╦R$bàCLS╦░Uï∞â∞.WVÄ╬4╕ù┐µ╛ΦÄ╪╣≤ÑÄ╨4&╟╝
╕&╣╘QPÜ(αâ─Ä╥4+└&ú,&ú*&ú(&ú0&ú.╗pÄ╘4ë^ΣîFµ&9t&Ä╓4&9vtÄ╪4&─X& ╖& ╖Ü£┘â─╟Fⁿ≥Ä┌4ï^ⁿ&â?uΘ╟ï├-╣ùì~Φï≡Ä┘╣≤Ñâ~εt%ïFεëF∞╟FεÄ▄4&íèëFΓ└~ëFΩδÉ╟FΩìFΦPÜ■α â─RPÄ╬4& 6°& 6÷╕Γ
P╕r╣ùQPÜααâ─╕r╣ùQPÜéBαâ─ìFΦPÜ■α â─RP╕δ
P╕r╣ùQPÜααâ─╕r╣ùQPÜéBαâ─âFⁿü~ⁿjsΘ) +└ëF≥ëF≡ëFΦëFΩëF∞ëFε╗εÄ▐4ë^▐îFα&ëÄα4&â>v└%╗ΣÄΓ4ë^┌îF▄&ëÄΣ4&â>x╔≈┘┴─^┌&ëĵ4&í╛
ÄΦ4&9«sÄΩ4&â> t─^┌&Ç3└P╣╢║ùëN╓ëV╪RQ╣QÉΦDâ─â~uΘ╬╕÷╣ùQP╕PÜ╝α â─Üÿ┘└tΘuÜ░┘HtpHtHHtMΘcܬ┘└uΘW─^▐&ï─^┌&àub╕Ä∞4&úhÄε4&údÄ╪4&─X& ╖Æ& ╖ÉÜ┌α â─δñÜñ┘└uΘ─^▐&ï─^┌&àu2δ┤Ä∞4&╟h3└PÜ₧┘ΘΣÄ≡4&╟T ╕Ä∞4&úhΘ┼É╕Θ╛╕t╣ùëF╥ëN╘ÉΦ3 ─^╥&9?~1╛Ä≥4& t& 4╕ª ╣ùQPÜ╠Fαâ─└uΘâ╞G─^╥&9?╥Ü╢┘ï°HuΘ≤HuΘGHtvHuΘ╛â }ΘWÄ⌠4&ít;╟ΘE2└P░PÜ╢] â─Ä÷4&àÜuΘ)ìFΦP╕PÜ╝α â─3└P v╪ v╓╕PÉΦ⌐â─Ä°4╤τ& ╡Ü┌┘ΘφÉÜ╘┘└uΘπ─^▐&ï─^┌&àtΘü╕Äε4&údÄ∞4&úhÄ╪4&─X& ╖Æ& ╖ÉÜ┌α â─Θµ■Ü╬┘└uΘò─^▐&ï─^┌&àtΘπδ░Éâ╟Θ6 2└P░PÜ╢] â─Ä÷4&àÜuΘ_Ä·4&â>tΘPìFΦP╕PÜ╝α â─3└P v╪ v╓╕PÉΦ╨â─Ü╚┘Θ"É2└P░PÜ╢] â─Ä÷4&àÜuΘ╟FΦⁿìFΦP╣QÜ╝α â─╟FΦÄⁿ4& é─^Σ&â?tpÄ╓4&â>vtdÄⁿ4& 6é& 6Ç╕≥
P╕r╣ùQPÜααâ─╕P╕PÄ■4& 6& 6Ü`┘â─╕r╣ùQPÄ■4& 6& 6ÜZ┘â─ÜT┘Ä∞4&╟h3└PÜ┬┘ΘOÉ╕÷╣ùQP╕PÜ╝α â─Äⁿ4& é─^Σ&â?tpÄ╓4&â>vtdÄⁿ4& 6é& 6Ç╕°
P╕r╣ùQPÜααâ─╕P╕PÄ■4& 6& 6Ü`┘â─╕r╣ùQPÄ■4& 6& 6ÜZ┘â─ÜT┘Ä≡4&╟T Ä∞4&╟hΘùÉ╕÷╣ùQP╕PÜ╝α â─Äⁿ4& é─^Σ&â?tpÄ╓4&â>vtdÄⁿ4& 6é& 6Ç╕■
P╕r╣ùQPÜααâ─╕P╕PÄ■4& 6& 6Ü`┘â─╕r╣ùQPÄ■4& 6& 6ÜZ┘â─ÜT┘3└PÜ╝┘â─Ä5&╞ª Ä5&íbÄε4&údÄ5&ífÄ∞4&úh╕P v╪ v╓╕PÉΦfâ─3└P v╪ v╓╕PÉΦQâ─^_ïσ]╦WV╕ùÄ╪+└úú■úⁿú·ú°ú÷╣ùÄ┴&úε╣ùÄ┴&úr╣ùÄ┴&ú╓╣ùÄ┴&ú6╣ùÄ┴&ú"╣╘Ä┴&úµ╣ùÄ┴&ú╝
╣ùÄ┴&ú≥╕ùÄ└╕ù┐µ╛ΦÄ╪╣≤Ñ^_╦ÉUï∞â∞V╕XPÜ╒ â─ëF·ëVⁿRPÜ`╒ â─└uuïv2└P░PÜ╢] â─Ä÷4&àÜtYܵα └uP2└P░PÜ╢] â─÷─ tÄFï▐F&è
└t*<t&PÜ÷] â─δÉÜ─α vⁿ v·Ü`╒ â─└tùδÉ╕δ'É2└P░PÜ╢] â─Ü:] ╕
PÜÄα â─Ü°] 3└^ïσ]╦ÉUï∞ü∞(WV╗bÄ5ë₧▐■îåα■&â?uΘ] v
vÜα┘â─ëFⁿëV■ïF└tHt#HuΘëHuΘòHuΘτ╕Θ)É╟FΘ╫É3÷96F~(┐εD╕P v
vWÜdαâ─
└uΘ÷â╟F;6F|█ï~ÄF
&â}t=& u& u v■ vⁿ╕Pìåb PÜααâ─ÄF
& u╕/PìFΓPÜααâ─
δ2É v■ vⁿìåb PÜ╝
αâ─ÄF
& u& u╕8PìFΓPÜααâ─ïF╤π╟çF─₧▐■& 7ìåb P╕EPìåΓ■PÜααâ─╕TPìåΓ■PÜ¿αâ─ï≡ëV■╨usÄ5&í╪&ï┌ëå┌■ëû▄■╨tZïF╤π╟çF ╢▄■ ╢┌■ìåb PÜ╝
αâ──₧▐■& 7ìåb P╕WPìåΓ■PÜααâ─╕fPìåΓ■PÜ¿αâ─ï≡ëV■ïF■╞u-â~uΘy■ìåΓ■PÄ╪4&─X& ╖>& ╖<Ü┌α â─ΘU■ïF■PVܪαâ─ìFΓPìåb PÜh
αâ─ìåb PìåΓ■PÜ<αâ─└uX9Ft!ìåb PÄ╪4&─X& ╖B& ╖@Ü┌α â─íFï╚╤α┴╤α╤αεDëFⁿî^■ FïFïV
ï≡Ä┌─~ⁿ╣≤ÑΘ≤Éâ~t+ v
vÜZ α â─RPÄ╪4&─X& ╖F& ╖DÜ┌α â─ìåΓ■PÜéBαâ─Θâ²â>FuΘy²3÷96F~%┐εD╕P v
vWÜdαâ─
└t
â╟F;6F|▐96F/â~uΘ=² v
vÜZ α â─RPÄ╪4&─X& ╖J& ╖HΘ╖■ï~ÄF
&â}t=& u& u v■ vⁿ╕iPìåb PÜααâ─ÄF
& u╕yPìFΓPÜααâ─
δ2É v■ vⁿìåb PÜ╝
αâ─ÄF
& u& u╕éPìFΓPÜααâ─ï▐╤πü├Fë₧╪■â?tÄ5& 6┌& 6╪ìåb PÜ╝
αâ─ìFΓPìåb PÜh
αâ─ï₧╪■╟ï■F;6F}rï╞╤αFëF·ï╟╤αFëF°ï╞╤α╞╤α╤αεDëF■ï╟╤α╟╤α╤αεDëFⁿíF+╞ëF÷ë~≥ëv⌠ïF■ï^ⁿï√ï≡╣≤Ñï^·âF·ïï^°âF°ëâFⁿâF■ N÷u╨ Fìåb PÜéBαâ─└u$9FuΘ╗√ìåb PÄ╪4&─X& ╖N& ╖LΘ?²â~uΘ├ìåb PÄ╪4&─X& ╖R& ╖PÜ┌α â─ΘƒÉÄ5&í╪&ï┌ëå┌■ëû▄■╨uΘé─₧▐■& 7 ╢▄■P╕Pìåb PÜααâ─╕Pìåb PÜ¿αâ─RPܪαδDÉÄ5&í╪&ï┌ëå┌■ëû▄■╨t-─₧▐■& 7 ╢▄■P╕Pìåb PÜααâ─ìåb PÜéBαâ─3└^_ïσ]╦Uï∞â∞(╗$Ä
5ë^▐îFα&â?uΘ≡╗╪Ä5ë^┌îF▄&ïG&uΘ╫íÆÉt 6Æ 6ÉÜ`╒ â─└uΘ╖╕dPÜ╒ â─úÉëÆÄ5&íbëF╪└tP─^┌& w& 7╕öP╕NFPÜααâ─δ─^┌& w& 7╕óP╕NFPÜααâ─ìFΓP╕NFPÜXXαâ─└uD╕NFPÜéBαâ──^▐& 7Ä╪4&─X& ╖₧& ╖£Ü┌α â─Ä5&╟z─^▐& 7ܵ┘ïσ]╦3└Ä╪9&úRúzLúxLÄ┌9&9ptIÄ▄9&9vt>╕PPÄ▐9& 6û& 6öÜ`┘â─╕╠#PÄ▐9& 6û& 6öÜZ┘â─ÜT┘δÉ╕ε#PÜ|α â─Ü°] Äα9&á£$■P░PÜ╢] â─╕PΦ½â─└u ÄΓ9&─X& ╖N& ╖LÜ┌α â─3└δnÉÄ┌9&â>ptJÄ▄9&â>vt>╕PPÄ▐9& 6û& 6öÜ`┘â─╕∙#PÄ▐9& 6û& 6öÜZ┘â─ÜT┘δÉ╕$PÜ|α â─╕PΦΣâ─╦V3└Ä╪9&úRúzLúxLÄ┌9&9ptHÄ▄9&9vt=╕PPÄ▐9& 6û& 6öÜ`┘â─╕&$PÄ▐9& 6û& 6öÜZ┘â─ÜT┘δ╕H$PÜ|α â─Ü:] Äα9&á£$■P░PÜ╢] â─3└PΦNâ─└tzÄ┌9&â>ptKÄ▄9&â>vt?╕PPÄ▐9& 6û& 6öÜ`┘â─╕S$PÄ▐9& 6û& 6öÜZ┘â─ÜT┘δÉÉ╕u$PÜ|α â─3└PΦâ─ï≡÷uÜ4┘ï╞^╦ÉUï∞â∞WVÄΣ9&í╕
&ï║
ï°ëV≡ï╚ï┌Ç─ëF≥ëV⌠╕Ç$PSQÜ╝
αâ─╕ç$P v≡WΦöâ─╕÷╣ùQPΦrâ─ĵ9&íµï╚╤α┴╤α╤α≡╣ùQPÜZ α â─RP╕ë$PÜ┌α â─ĵ9&íµï╚╤α┴╤α╤α≡╣ùQPÜZ α â─RP v≡WΦ'â─3└ëF■ëF·ÄΦ9&9Σ~Që~ε╛≡ï°Äµ9&9>µt,╕ù$P v≡ vεΦ≡â─╕ùPVÜZ α â─RP v≡ vεΦ╒â─â╞GÄΦ9&9>Σ║ï~ε╕Ö$P v≡WΦ┤â─╗8ÄΩ9ë^µîFΦ+└&ëG&ë9Ft╕÷╣ùQPÜ:┘â─└'â~uZízLï╚╤α┴╤α╤α0╣ùQPÜ:┘â─└~9─^µ&ïG&t-╕P& w& 7 v⌠ v≥Ü<αâ─
─^≥&╞GS v≡WΦ%â─╕£$P v≡WΦâ─â~t)Ä∞9&â>^uÄε9&â>`t╕ó$δ6╕º$δ1É╕¼$δ+ÉÄ≡9&÷▓t╕▒$P v≡WΦ╠â─Ä≡9&÷│Çu╕╢$P v≡WΦ▒â─╕╗$P v≡WΦóâ─Ä≥9&â>Σ└≈╪¿t+╕ùÄ└&ÇΣâ~u:&íΣ╣ùÄ┘#εëFΣ¿t╛δ&É╕ùÄ└δ┘É÷FΣt╛δÉïv■¿t
╛δ&ï6Σâ■└≈╪¿t╕╛$δ`Éâ~t6≈╞t╕├$P v≡WΦâ─≈╞t╕╚$P v≡WΦ√â─ï╞¿t3╕═$δ"É≈╞t╕╥$δÉ≈╞t╕╫$δ
Éï╞¿t╕▄$P v≡WΦ┬â─Ä≡9&÷│Çtâ~tÄ⌠9&â>zu╕ß$P v≡WΦòâ─╕µ$P v≡WΦåâ─╕ε$P v≡WΦwâ─╕≤$P v≡WΦhâ─Ä÷9&â>j uÄΓ9&─X&ïç╝&ïù╛δ╕⌡$î┌ëFⁿëV■RPÄ°9& 6⌠Ä·9& 6≥╕÷$P╕P╕%P v⌠ v≥Üααâ─ v⌠ v≥ v≡WΦⁿâ─╕%P v≡WΦφâ─Äⁿ9& 6║& 6╕Ä■9& 6╛& 6╝Ä:& 6╢& 6┤╕#%P v⌠ v≥Üααâ─ v⌠ v≥ v≡WΦBâ─Ä:& 6╞& 6─Ä:& 6╩& 6╚Ä:& 6┬& 6└╕0%P v⌠ v≥Üααâ─ v⌠ v≥ v≡WΦ⌡â─╕=%P v≡WΦDâ─Ä:&í&&ï(Ç─0ü╥T|RP╕E%P v⌠ v≥Üααâ─ v⌠ v≥ v≡WΦâ─ v≡WÜ"αâ─ï≡Äα9&á£$■P░PÜ╢] â─╟FΩ╕pPÜ╒ â─ëF÷ëV°ëv∞ë~εïv≥ v∞╕O%P v⌠VÜααâ─
v⌠VÜ"αâ─P v⌠VÜj!α â─ëF■╕P╣Q╣\%QÜJ] â─╕P v⌠VÜ"αâ─P v⌠VÜJ] â─╕P v∞ v≡ vεÜJ] â─╟F·â~∞~;ï~■ïv·Ä^≡ï^εèÿï╪ï╟è─*Σ3╪╤π╕QÄ└ï╟èα*└&3çZï°F;v∞|╓ë~■ïv≥Ü°] v■╕_%P v⌠VÜααâ─
╕P v⌠VÜ"αâ─P v⌠VÜJ] â─ïFΩ FΩ=vΘτ╕╨PÜ╒ â─ëFⁿëV■ v° v÷Ü`╒ â─└tΘ 2└P░PÜ╢] â─Ä
:&àÜuΘ v■ vⁿÜ`╒ â─└tΘº■Ü|] ÷─uܵα └tΘ▒Ü─α δ¥3└PÜ(α â─ï°-*uï╕i%P v⌠VÜ╝
αâ─ v⌠VΦ2â─└uΘi 6`# 6^# v⌠VÜ╠Fαâ─└uΘN 6p# 6n# v⌠ v≥Ü╠Fαâ─└tΘ■╕Θ╩ï~εÄΓ9&─X& ╖Ω& ╖Φ╕e%PïF≡PWï≡Üααâ─ï╞ï≈ëF■ëvⁿΘàÉ2└P░PÜ╢] â─ÄΓ9&─X&ïçá&ïùóï°ëV■δ\2└P░PÜ╢] â─Ä
:&àÜuÄΓ9&─X&ïçÇ&ïùéδ╦ÄΓ9&─X& ╖Ω& ╖Φ╕k%PïF⌠PVï°Üααâ─ï╟ï■ëF■ v■WÜ┌α â─3└^_ïσ]├Uï∞ü∞WV╟Få╟åP ╞å{ ╟å8 o%î₧: ╟å< w%î₧> ╟å@ ~%î₧B ╟åD à%î₧F ╟åH ï%î₧J +└ëåN ëåL ÄΣ9&í╕
&ï║
ëåv ëûx Ç─ï≡ëû~ Ç─ï°ëûp Ç─ëår ëût ╗8ÄΩ9ë₧■îå
■+└&ëG&ëë╛n Ä┌9&9ptHÄ▄9&9vt=╕PPÄ▐9& 6û& 6öÜ`┘â─╕æ%PÄ▐9& 6û& 6öÜZ┘â─ÜT┘δ╕╡%PÜ|α â─╗TÄ:ë₧■îå■&╟╕╨PÜ╒ â─ëF∞ëVε╕pPÜ╒ â─ëF≡ëV≥+└ëF÷ëF⌠èå{ ■å{ <vΘvâ~uZ 6`# 6^#╕└%P ╢~ VÜααâ─╕P ╢~ VÜ"αâ─P ╢~ VÜJ] intended receiver can decrypt the
message. Even the person who encrypted it can not reverse the process.
When you receive a message, you use your secret decryption key to decrypt
the message. This secret key never leaves your computer. In fact, your
secret key is itself encrypted to protect it from anyone snooping around
your computer.
1.4. How much does PGP cost?
Nothing! (Compare to ViaCrypt PGP at $98!) It should be noted, however,
that in the United States, the freeware version of PGP *MAY* be a
violation of a patent held by Public Key Partners (PKP).
1.5. Is encryption legal?
In much of the civilized world, encryption is either legal, or at least
tolerated. However, there are a some countries where such activities
could put you in front of a firing squad! Check with the laws in your own
country before using PGP or any other encryption product. A couple of the
countries where encryption is illegal are Iran and Iraq.
1.6. Is PGP legal?
In addition to the comments about encryption listed above, there are a
couple of additional issues of importance to those individuals residing
in the United States or Canada. First, there is a question as to whether
or not PGP falls under ITAR regulations which govern the exporting of
cryptographic technology from the United States and Canada. This despite
the fact that technical articles on the subject of public key encryption
have been available legally worldwide for a number of years. Any
competent programmer would have been able to translate those articles
into a workable encryption program. There is the possibility that ITAR
regulations may be relaxed to allow for encryption technology.
1.7. Where can I get translations of the PGP documentation and/or
language.txt files?
Spanish ghost.dsi.unimi.it:/pub/crypt.
Author Armando Ramos <armando@clerval.org>
German: Marc Aurel <4-tea-2@bong.saar.de>
Also: black.ox.ac.uk:/src/security/pgp_german.txt
Swedish: black.ox.ac.uk:/src/security/pgp_swedish.txt
Italian: ghost.dsi.unimi.it:/pub/crypt/pgp-lang.italian.tar.gz
Author: David Vincenzetti <vince@dsi.unimi.it>
Lithuanian: ghost.dsi.unimi.it:/pub/crypt/pgp23ltk.zip
nic.funet.fi:/pub/crypt/ghost.dsi.unimi.it/pgp23ltk.zip
Author: Zygimantas Cepaitis, Bokera Ltd., Kaunas Lithuania.
<zcepaitis@ktl.fi> or <zygis@bokera.lira.lt.ee>
1.8. Is there an archive site for alt.security.pgp?
laszlo@instrlab.kth.se (Laszlo Baranyi) says:
"My memory says that ripem.msu.edu stores a backlog of both
alt.security.pgp, and sci.crypt. But that site is ONLY open for ftp for
those that are inside US."
1.9. Is there a commercial version of PGP available?
Yes, by arrangement with the author of PGP, a company called ViaCrypt is
marketing a version of PGP that is almost identical to the version
currently available on Internet. Each can read or write messages to the
other. The list price of ViaCrypt PGP is $98 (US) for a single user
license and is NOT available for export from the United States. In
addition, it is presently available only for MS-DOS and Unix. Soon to be
available are versions for CompuServe's WinCIM & CSNav. Versions for
other platforms are under development. While the present product is 100%
compatible with free PGP, it is not known if this will remain the case in
the future. The address of ViaCrypt is:
ViaCrypt
David A. Barnhart
Product Manager
2104 West Peoria Avenue
Phoenix, Arizona 85029
Tel: (602) 944-0773
Fax: (602) 943-2601
E-Mail: 70304.41@compuserve.com
E-Mail: wk01965@worldlink.com
Credit card orders only. (800)536-2664 (8-5 MST M-F)
1.10. What platforms has PGP been ported to?
1.10.1. DOS: 2.3a
1.10.2. MAC: 2.3
1.10.3. OS/2: 2.3a
1.10.4. Unix: 2.3a (Variations exist for many different systems.)
1.10.5. VAX/VMS: 2.3a
1.10.6. Atari ST: 2.3a
1.10.7. Archimedes: 2.3a subversion 1.18b
1.10.8. Commodore Amiga: 2.3a patchlevel 2
From: simons@peti.GUN.de (Peter Simons)
Date: Fri, 31 Dec 1993 08:10:53 +0100
Newsgroups: alt.security.pgp
Subject: PGPAmiga 2.3a.2 available for FTP
TITLE
Pretty Good Privacy (PGP)
VERSION
Version 2.3a patchlevel 2
AUTHOR
Amiga port and enhancements by Peter Simons <simons@peti.GUN.de>
CHANGES
This version is re-compiled with SAS/C 6.50. A few minor bugs have
been fixed. Additionally, the manual is now available in TexInfo style
and can easily be converted into AmigaGuide, postscript, dvi or whatever
format. AmigaGuide versions are included.
Also for the first time, the alt.security.pgp frequently asked
questions (FAQ) are included in the archive.
NOTES
Please take note that the archive contains a readme file, with
checksums for ALL files in the distribution and is signed with my key!
Please be careful, if this file is missing or rigged!
A mailing list concerning PGPAmiga has been opened on peti.GUN.de.
To subscribe, send e-mail to listserv@peti.GUN.de with "ADD your_address
PGPAmiga" in the message body. You may add "HELP" in the next line to
receive a command overview of ListSERV.
SPECIAL REQUIREMENTS
none
HOST NAME
Any Aminet host, i.e. ftp.uni-kl.de (131.246.9.95).
DIRECTORY
/pub/aminet/util/crypt/
FILE NAMES
PGPAmi23a_2.lha
PGPAmi23a2_src.lha
1.11. Where can I obtain PGP?
FTP sites:
soda.berkeley.edu
/pub/cypherpunks/pgp (DOS, MAC)
Verified: 21-Dec-93
ftp.demon.co.uk
/pub/amiga/pgp
/pub/archimedes
/pub/pgp
/pub/mac/MacPGP
ftp.informatik.tu-muenchen.de
ftp.funet.fi
ghost.dsi.unimi.it
/pub/crypt
Verified: 21-Dec-93
ftp.tu-clausthal.de (139.174.2.10)
wuarchive.wustl.edu
/pub/aminet/util/crypt
src.doc.ic.ac.uk (Amiga)
/aminet
/amiga-boing
ftp.informatik.tu-muenchen.de
/pub/comp/os/os2/crypt/pgp23os2A.zip (OS/2)
black.ox.ac.uk (129.67.1.165)
/src/security (Unix)
iswuarchive.wustl.edu
pub/aminet/util/crypt (Amiga)
csn.org
/mpj (see README.MPJ for export restrictions)
nic.funet.fi (128.214.6.100)
van-bc.wimsey.bc.ca (192.48.234.1)
ftp.uni-kl.de (131.246.9.95)
qiclab.scn.rain.com (147.28.0.97)
pc.usl.edu (130.70.40.3)
leif.thep.lu.se (130.235.92.55)
goya.dit.upm.es (138.4.2.2)
tupac-amaru.informatik.rwth-aachen.de (137.226.112.31)
ftp.etsu.edu (192.43.199.20)
princeton.edu (128.112.228.1)
pencil.cs.missouri.edu (128.206.100.207)
Also, try an archie search for PGP using the command:
archie -s pgp23 (DOS Versions)
archie -s pgp2.3 (MAC Versions)
ftpmail:
For those individuals who do not have access to FTP, but do have access
to e-mail, you can get FTP files mailed to you. For information on
this service, send a message saying "Help" to ftpmail@decwrl.dec.com.
You will be sent an instruction sheet on how to use the ftpmail
service.
BBS sites:
Hieroglyphics Vodoo Machine (Colorado)
DOS version only
(303) 443-2457
Verified: 26-Dec-93
Colorado Catacombs BBS
(303) 938-9654
Exec-Net (New York)
Host BBS for the ILink net.
(914) 667-4567
The Grapvine BBS (Little Rock Arkansas)
No longer in operation
2. General Questions
2.1. Why can't a person using version 2.2 read my version 2.3 message?
Try adding "+pkcs_compat=0" to your command line as follows: "pgp -seat
+pkcs_compat=0 <filename>" By default, version 2.3 of PGP uses a
different header format that is not compatible with earlier versions of
PGP. Inserting this option into the command will force PGP to use the
older header format. You can also set this option in your config.txt
file, but this is not recommended.
2.2. Why does it take so long to encrypt/decrypt messages?
This problem can arise when you have placed the entire public key ring
from one of the servers into the pubring.pgp file. PGP may have to search
through several thousand keys to find the one that it is after. The
solution to this dilemma is to maintain 2 public key rings. The first
ring, the normal pubring.pgp file, should contain only those individuals
that you send messages to quite often. The second key ring can contain
ALL of the keys for those occasions when the key you need isn't in your
short ring. You will, of course, need to specify the key file name
whees this by encrypting your mail so
that nobody but the intended person can read it. When encrypted, the
message looks like a meaningless jumble of random characters. PGP has
proven itself quite capable of resisting even the most sophisticated
forms of analysis aimed at reading the encrypted text.
PGP can also be used to apply a digital signature to a message without
encrypting it. This is normally used in public postings where you don't
want to hide what you are saying, but rather want to allow others to
confirm that the message actually came from you. Once a digital signature
is created, it is impossible for anyone to modify either the message or
the signature without the modification being detected by PGP.
While PGP is easy to use, it does give you enough rope so that you can
hang yourself. You should become thoroughly familiar with the various
options in PGP before using it to send serious messages. For example,
giving the command "PGP -sat <filename>" will only sign a message, it
will not encrypt it. Even though the output looks like it is encrypted,
it really isn't. Anybody in the world would be able to recover the
original text.
1.2. Why should I encrypt my mail? I'm not doing anything illegal!
You should encrypt your e-mail for the same reason that you don't write
all of your correspondence on the back of a post card. E-mail is actually
far less secure than the postal system. With the post office, you at
least put your letter inside an envelope to hide it from casual snooping.
Take a look at the header area of any e-mail message that you receive and
you will see that it has passed through a number of nodes on its way to
you. Every one of these nodes presents the opportunity for snooping.
Encryption in no way should imply illegal activity. It is simply
intended to keep personal thoughts personal.
Xenon <an48138@anon.penet.fi> puts it like this:
Crime? If you are not a politician, research scientist, investor, CEO,
lawyer, celebrity, libertarian in a repressive society, investor, or
person having too much fun, and you do not send e-mail about your private
sex life, financial/political/legal/scientific plans, or gossip then
maybe you don't need PGP, but at least realize that privacy has nothing
to do with crime and is in fact what keeps the world from falling apart.
Besides, PGP is FUN. You never had a secret decoder ring? Boo! -Xenon
(Copyright 1993, Xenon)
1.3. What are public keys and private keys?
With conventional encryption schemes, keys must be exchanged with
everyone you wish to talk to by some other secure method such as face to
face meetings, or via a trusted courier. The problem is that you need a
secure channel before you can establish a secure channel! With
conventional encryption, either the same key is used for both encryption
and decryption or it is easy to convert either key to the other. With
public key encryption, the encryption and decryption keys are different
and it is impossible for anyone to convert one to the other. Therefore,
the encryption key can be made public knowledge, and posted in a database
somewhere. Anyone wanting to send you a message would obtain your
encryption key from this database or some other source and encrypt his
message to you. This message can't be decrypted with the encryption key.
Therefore nobody other than theing currently available algorithms for
factoring, the 384 bit key is just not far enough out of reach to be a
good choice.
3.2. Why does PGP take so long to add new keys to my key ring?
The time required to check signatures and add keys to your public key
ring tends to grow as the square of the size of your existing public key
ring. This can reach extreme proportions. I just recently added the
entire 850KB public key ring form one of the key servers to my local
public key ring. Even on my 66MHz 486 system, the process took over 10
hours.
3.3. How can I extract multiple keys into a single armored file?
A number of people have more than one public key that they would like to
make available. One way of doing this is executing the "-kxa" command for
each key you wish to extract from the key ring into separate armored
files, then appending all the individual files into a single long file
with multiple armored blocks. This is not as convenient as having all of
your keys in a single armored block.
Unfortunately, the present version of PGP does not allow you to do this
directly. Fortunately, there is an indirect way to do it. First, extract
each of the desired keys into separate armored key files using the
command "pgp -kxa <key>". Next, create a temporary key ring by adding
the individual key files one by one using the command "pgp -ka <keyfile>
<temp-key-ring>". This new temporary key ring will contain only the keys
that you are interested in. Finally, execute the command "pgp -kxa * <new-
armored-file> <temp-key-ring> to extract all of the keys in the temporary
ring to an armored file. Note the "*" in the previous command. It is not
described in the PGP documentation but apparently means "all keys". This
armored file now contains all of the desired keys just as if pgp had had
a built in command to do it in the first place.
A Unix script to perform the extraction with a single command would be as
follows:
foreach name (name1 name2 name3 ...)
pgp -kx $name /tmp/keys.pgp <keyring>
end
An equivalent DOS command would be:
for %a in (name1 name2 name3 ...) do pgp -kx %a <keyring>
3.4. I tried encrypting the same message to the same address two different
times and got completely different outputs. Why is this?
Every time you run pgp, a different session key is generated. This
session key is used as the key for IDEA. As a result, the entire header
and body of the message changes. You will never see the same output
twice, no matter how many times you encrypt the same message to the same
address. This adds to the overall security of PGP.
3.5. How do I specify which key to use when an individual has 2 or more
public keys and the very same user ID on each, or when 2 different
users have the same name?
Instead of specifying the user's name in the ID field of the PGP command,
you can use the key ID number. The format is 0xNNNNNN where NNNNNN is the
user's 6 character key ID number. It should be noted that you don't need
to enter the entire ID number, a few consecutive digits from anywhere in
the ID should do the trick. Be careful: If you enter "0x123", you will
be matching key IDs 0x123937, 0x931237, or 0x912373. Any key ID that
contains "123" anywhere in it will produce a match. They don't need to
be the starting characters of the key ID. You will recognize that this
is the format for entering hex numbers in the C programming language. For
example, any of the following commands could be used to encrypt a file to
me.
pgp -e <filename> "Gary Edstrom"
pgp -e <filename> gbe@netcom.com
pgp -e <filename> 0x90A9C9
This same method of key identification can be used in the config.txt file
in the "MyName" variable to specify exactly which of the keys in the
secret key ring should be used for encrypting a message.
3.6. What does the message "Unknown signator, can't be checked" mean?
It means that the key used to create that signature does not exist in
your database. If at sometime in the future, you happen to add that key
to your database, then the signature line will read normally. It is
completely harmless to leave these non-checkable signatures in your
database. They neither add to nor take away from the validity of the key
in question.
3.7. How do I get PGP to display the trust parameters on a key?
You can only do this when you run the -kc option by itself on the entire
database. The parameters will NOT be shown if you give a specific ID on
the command line. The correct command is: "pgp -kc". The command "pgp -kc
smith" will NOT show the trust parameters for smith.
4. Security Questions
4.1. How secure is PGP?
The big unknown in any encryption scheme based on RSA is whether or not
there is an efficient way to factor huge numbers, or if there is some
backdoor algorithm that can break the code without solving the factoring
problem. Even if no such algorithm exists, it is still believed that RSA
is the weakest link in the PGP chain.
4.2. Can't you break PGP by trying all of the possible keys?
This is one of the first questions that people ask when they are first
introduced to cryptography. They do not understand the size of the
problem. For the IDEA encryption scheme, a 128 bit key is required. Any
one of the 2^128 possible combinations would be legal as a key, and only
that one key would successfully decrypt all message blocks. Let's say
that you had developed a special purpose chip that could try a billion
keys per second. This is FAR beyond anything that could really be
developed today. Let's also say that you could afford to throw a billion
such chips at the problem at the same time. It would still require over
10,000,000,000,000 years to try all of the possible 128 bit keys. That is
something like a thousand times the age of the known universe! While the
speed of computers continues to increase and their cost decrease at a
very rapid pace, it will probably never get to the point that IDEA could
be broken by the brute force attack.
The only type of attack that might succeed is one that tries to solve the
problem from a mathematical standpoint by analyzing the transformations
that take place between plain text blocks, and their cipher text
equivalents. IDEA is still a fairly new algorithm, and work still needs
to be done on it as it relates to complexity theory, but so far, it
appears that there is no algorithm much better suited to solving an IDEA
cipher than the brute force attack, which we have already shown is
unworkable. The nonlinear transformation that takes place in IDEA puts it
in a class of extremely difficult to solve mathmatical problems.
4.3. How secure is the conventional cryptography (-c) option?
Assuming that you are using a good strong random pass phrase, it is
actually much stronger than the normal mode of encryption because you
have removed RSA which is believed to be the weakest link in the chain.
Of course, in this mode, you will need to exchange secret keys ahead of
time with each of the recipients using some other secure method of
communication, such as an in-person meeting or trusted courier.
4.4. Can the NSA crack RSA?
This question has been asked many times. If the NSA were able to crack
RSA, you would probably never hear about it from them. The best defense
against this is the fact the algorithm for RSA is known worldwide. There
are many competent mathematicians and cryptographers outside the NSA and
there is much research being done in the field right now. If any of them
were to discover a hole in RSA, I'm sure that we would hear about it from
them. I think that it would be hard to hide such a discovery. For this
reason, when you read messages on USENET saying that "someone told them"
that the NSA is able to break pgp, take it with a grain of salt and ask
for some documentation on exactly where the information is coming from.
4.5. How secure is the "for your eyes only" option (-m)?
It is not secure at all. There are many ways to defeat it. Probably the
easiest way is to simply redirect your screen output to a file as
follows:
pgp [filename] > [diskfile]
The -m option was not intended as a fail-safe option to prevent plain
text files from being generated, but to serve simply as a warning to the
person decrypting the file that he probably shouldn't keep a copy of the
plain text on his system.
4.6. What if I forget my pass phrase?
In a word: DON'T. If you forget your pass phrase, there is absolutely no
way to recover any encrypted files. I use the following technique: I have
a backup copy of my secret key ring on floppy, along with a sealed
envelope containing the pass phrase. I keep these two items in separate
safe locations, neither of which is my home or office. The pass phrase
used on this backup copy is different from the one that I normally use on
my computer. That way, even if some stumbles onto the hidden pass phrase
and can figure out who it belongs to, it still doesn't do them any good,
because it is not the one required to unlock the key on my computer.
4.7. Why do you use the term "pass phrase" instead of "password"?
This is because most people, when asked to choose a password, select some
simple common word. This can be cracked by a program that uses a
dictionary to try out passwords on a system. Since most people really
don't want to select a truly random password, where the letters and
digits are mixed in a nonsense pattern, the term pass phrase is used to
urge people to at least use several unrelated words in sequence as the
pass phrase.
4.8. If my secret key ring is stolen, can my messages be read?
No, not unless they have also stolen your secret pass phrase, or if your
pass phrase is susceptible to a brute-force attack. Neither part is
useful without the other. You should, however, revoke that key and
generate a fresh key pair using a different pass phrase. Before revoking
your old key, you might want to add another user ID that states what your
new key id is so that others can know of your new address.
4.9. How do I choose a pass phrase?
All of the security that is available in PGP can be made absolutely
useless if you don't choose a good pass phrase to encrypt your secret key
ring. Too many people use their birthday, their telephone number, the
name of a loved one, or some easy to guess common word. While there are
a number of suggestions for generating good pass phrases, the ultimate in
security is obtained when the characters of the pass phrase are chosen
completely at random. It may be a little harder to remember, but the
added security is worth it. As an absolute minimum pass phrase, I would
suggest a random combination of at least 8 letters and digits, with 12
being a better choice. With a 12 character pass phrase made up of the
lower case letters a-z plus the digits 0-9, you have about 62 bits of
key, which is 6 bits better than the 56 bit DES keys. If you wish, you
can mix upper and lower case letters in your pass phrase to cut down the
number of characters that are required to achieve the same level of
security. I don't do this myself because I hate having to manipulate the
shift key while entering a pass phrase.
A pass phrase which is composed of ordinary words without punctuation or
special characters is susceptible to a dictionary attack. Transposing
characters or mis-spelling words makes your pass phrase less vulnerable,
but a professional dictionary attack will cater for this sort of thing.
4.10. How do I remember my pass phrase?
This can be quite a problem especially if you are like me and have about
a dozen different pass phrases that are required in your everyday life.
Writing them down someplace so that you can remember them would defeat
the whole purpose of pass phrases in the first place. There is really no
good way around this. Either remember it, or write it down someplace and
risk having it compromised.
4.11. How do I verify that my copy of PGP has not been tampered with?
If you do not presently own any copy of PGP, use great care on where you
obtain your first copy. What I would suggest is that you get two or more
copies from different sources that you feel that you can trust. Compare
the copies to see if they are absolutely identical. This won't eliminate
the possibility of having a bad copy, but it will greatly reduce the
chances.
If you already own a trusted version of PGP, it is easy to check the
validity of any future version. There is a file called PGPSIG.ASC
included with all new releases. It is a stand-alone signature file for
the contents of PGP.EXE. The signature file was created by the author of
the program. Since nobody except the author has access to his secret key,
nobody can tamper with either PGP.EXE or PGPSIG.ASC without it being
detected. To check the signature, you MUST be careful that you are
executing the OLD version of PGP to check the NEW. If not, the entire
check is useless. Let's say that your existing copy of PGP is in
subdirectory C:\PGP and your new copy is in C:\NEW. You should execute
the following command:
\PGP\PGP C:\NEW\PGPSIG.ASC C:\NEW\PGP.EXE
This will force your old copy of PGP to be the one that is executed. If
you simply changed to the C:\NEW directory and executed the command "PGP
PGPSIG.ASC PGP.EXE" you would be using the new version to check itself,
and this is an absolutely worthless check.
Once you have properly checked the signature of your new copy of PGP, you
can copy all of the files to your C:\PGP directory.
4.12. How do I know that there is no trap door in the program?
The fact that the entire source code for PGP is available makes it just
about impossible for there to be some hidden trap door. The source code
has been examined by countless individuals and no such trap door has been
found. To make sure that your executable file actually represents the
given source code, all you need to do is to re-compile the entire
program. I did this with the DOS version 2.3a and the Borland C++ 3.1
compiler and found that the output exactly matched byte for byte the
distributed executable file.
4.13. Can I put PGP on a multi-user system like a network or a
mainframe?
You can, but you should not, because this greatly reduces the security of
your secret key/pass phrase. This is because your pass phrase may be
passed over the network in the clear where it could be intercepted by
network monitoring equipment. Also, while it is being used by PGP on the
host system, it could be caught by some Trojan Horse program. Also, even
though your secret key ring is encrypted, it would not be good practice
to leave it lying around for anyone else to look at.
4.14. Why not use RSA alone rather than a hybrid mix of IDEA, MD5, & RSA?
Two reasons: First, the IDEA encryption algorithm used in PGP is actually
MUCH stronger than RSA given the same key length. Even with a 1024 bit
RSA key, it is believed that IDEA encryption is still stronger, and,
since a chain is no stronger than its weakest link, it is believed that
RSA is actually the weakest part of the RSA - IDEA approach. Second, RSA
encryption is MUCH slower than IDEA. The only purpose of RSA in most
public key schemes is for the transfer of session keys to be used in the
conventional secret key algorithm, or to encode signatures.
4.15. Aren't all of these security procedures a little paranoid?
That all depends on how much your privacy means to you! Even apart from
-----BEGIN PGP SIGNATURE-----
Version: 2.3a
iQCVAgUBLYNVK0HZYsvlkKnJAQGHxgP/W4IHn/55CYq/Cc6QnNHqp+5rV45iID5W
75ERD/HSeypwvbLvoEhctPVoyReuJwKgSr1T3lAZuov6bIeMKP1gjMh1eeSPJyYW
EeA8JMBaNiwc0v8nESWok3KD+TDnzeUFpqRaRwvYsFSMdTjJIIwSVhowRoEToBnx
YHusjhcWqEs=
=axeq
-----END PGP SIGNATURE-----