-----BEGIN PGP SIGNED MESSAGE----- In article <199412230045.TAA21904@thor.cs.umass.edu>, "L. McCarthy" <lmccarth@thor.cs.umass.edu> wrote:
Dave Horsfall writes:
ADAM GERSTEIN, _THE_ MACGURU writes:
A friend of mine thinks his girlfriend has been cheating on him, and thinks the proof may be in a few Norton Encrypt files. Is there anyway to get the password with a data/resource editor, or is he shit-out-of-luck
Boy; talk about an inappropriate use of technology... Is "privacy" in that guy's vocabulary? I respectfully submit that if he has to start snooping on her, the relationship is over anyway.
GROAN! What the hell is this list about anyway?????? I think we are losing perspective about encryption, privacy etc etc... Putting it quite simply, the individual was asking about how to make an attack on an opponent. Whether that opponent is a girlfriend, spouse, competitor or terrorist group, who cares? Lets save the sermonizing for Ann Landers...what state the relationship is irrelevant. The gentleman asked a question regarding a standard cryptographic problem... how you can intercept and interpret encrypted information, either in theory in practice. To make judgement calls is WAY out of line and a hell of a bad precedent for this group. I bet the poster would have gotten a more sympathetic response if he said he had gotton his hands on a diplomatic cable....
My sentiments exactly. Whether or not she's two-timing, I imagine she'd be pretty upset (and justifiably so) if she knew her boyfriend wants to break into her private documents. He should *ask* her straight out to confirm or deny his suspicions. If he doesn't like the answer, he should get out.
Oh boy! Pretty soon we will have this list as "cypherpunks giving advice to the lovelorn..."!!! Lets cut the crap, stick to the problem at hand and offer solutions to what the participants of the list know best, namely the the use and analysis of cryptographic problems. Save the relationship bullshit for Masters and Johnson....
Someone needs to give her PGP ASAP, IMHO....
Sure, from a disspassionate point of view, I agree. But I thought that the whole point of this list was the promotion of PGP and the discussion of the pro's and con's of encryption in general. That should include attacking as well as defense. Since, how can you rationally discuss defense unless you know what kind of attack your opponents can mount against you??????? -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBLvo+sHBFBj7pSNyhAQEj8Qf/Yk+avezO8+bQw1vFBFht/STmhmHbXuVL qtWiJhHdCJigsUyVAGWMgCBhZE6eWHgD0DylhIHywVK2Y2VvI0A6Vi1/Bk+rkviw F2AFLJwV+td2yvoEVWCRL4kQlW7RLAuiYdJ2Vlb0Kw2Q8EkuxOcLiYXYAE/c6LTf DNXc9238IbMoL+hbUzA3xkPL/S7LriRcNW9nzeCYHLt0SSkEn9mxd8c120jRz0aL F33i7Fgnuy3OM5QUORxv78bjfzo6jBTXzW02ikp7YwtbDYv+RCt8b7dwmdJDHoV+ LtJ+qOV3pNk6UBUXMqeTig5Azi9NtVyh8MmhCozC0BaVuOxodcjkRA== =VPdb -----END PGP SIGNATURE-----