
The anonymous porn protagonist writes:
Here, yet again, is the same Time-Life child pornography picture, which is encrypted with the public keys of people I don't know from squat. Nonetheless, they are now co-conspirators in the Time-Life/Cypherpunks child pornography ring.
is keyid 0xD2DF803D this key? Type Bits/KeyID Date User ID pub 1024/D2DF803D 1995/08/13 Joseph Chamness <jmnc2@student.open.ac.uk> Key fingerprint = 6F A9 2E 13 AF 1F 10 E6 5C 25 89 0A B4 09 26 3B Either you're getting these keys off the keyservers, or we have a real life example of a keyid collision. (The Joseph with the key above is my brother in law and he's never been subscribed to nor read cypherpunks to my knowledge). btw, I have Joseph's public and private keys on my disk, he gave them to me because he forgot his passphrase almost as soon as I showed him how to generate the key. We were unsuccessful in guessing his passphrase with PGPcrack, so I won't be viewing this gif. Unfortunately I added his key to the keyservers for him before he forgot his passphrase. btw2 thanks for the copy to my key in the previous post. It was really quite a boring picture. Anyway, I did pgp -w t.gif after viewing just to be on the safeish side :-) btw3 is there some moral to this exercise? Showing child porn is over-hyped? Attempting to give fedz an excuse to bust us other than for being crypto enthusiasts, exporters of illegal T-shirts, and thinkers of non-government approved thoughts? (Thinking of the AA case where the fedz mailed the target a child porn package and kicked the door in seconds after the package hit the door mat, before they even knew their mail had arrived, and busted them for "possession" of child porn.) Adam -- Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`