home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!think.com!spool.mu.edu!agate!netsys!ukma!computer-privacy-request
- Date: Wed, 23 Dec 1992 04:12:49 GMT
- From: Sharon Fisher <slf@netcom.com>
- Newsgroups: comp.society.privacy
- Subject: Re: Comm Week article omits PGP
- Message-ID: <comp-privacy1.118.5@pica.army.mil>
- Organization: Netcom - Online Communication Services (408 241-9760 guest)
- Sender: comp-privacy@pica.army.mil
- Approved: comp-privacy@pica.army.mil
- X-Submissions-To: comp-privacy@pica.army.mil
- X-Administrivia-To: comp-privacy-request@pica.army.mil
- X-Computer-Privacy-Digest: Volume 1, Issue 118, Message 5 of 9
- Lines: 19
-
- Sharon Fisher <slf@netcom.com> writes:
-
- >oppedahl@panix.com (Carl Oppedahl) writes:
-
- >>An article in the December 14, 1992 Communications Week describes
- >>an encryption arrangement said to be used by "many users", namely
- >>using a public-key method to encrypt a DES key which is then used
- >>to encrypt the message.
-
- >>The article goes on at length but somehow manages to miss PGP, which
- >>I suspect is the most widely used software that does this.
-
- >The article I turned in included a reference to PGP; it was cut out in
- >the editing process, of which I am not a part.
-
- Shoulda checked before I typed. PGP was indeed cut for length, but I
- did it myself.
-
-