17 Dec
2003
17 Dec
'03
11:17 p.m.
On Fri, 6 Oct 1995, Lucky Green wrote:
And by the way, "proprietary" algorithms are generally junk and should not be relied upon by security concious individuals and businesses. Only algorithms that have undergone extensive peer review should be considered for use.
It's OK, when these guys were spamming Usenet a few weeks ago with their product announcement (admittedly, they did at least keep it to comp groups) they said it was export-approved. Therefore, it can be pretty much written off from a security standpoint - it's at best as good as 40-bit RC4, and I sure wouldn't use that for secure communications. I'd still like to know how it works so we can see just how insecure it is, though. Mark