More snake oil: ENIGMA

Seen on usenet. I'm not currently subscibing to the list, so I hope it's not old news. ----------------------------------->8-------------------------------- Can You KEEP a SECRET? Doctor? Lawyer? Accountant? Executive? Or even Politician? -- you know there is some information your clients don't want to fall into public hands. Can you keep a secret? They want you to. Let's face it, you want to keep some things a secret as much as they do! Now you can. Now there is an unbreakable version of ENIGMA which is so easy to use that a child can send messages the CIA can't break. Perhaps you remember the original version of ENIGMA used so successfully by the Germans during World War II. Hundreds of cryptologists worked for thousands of hours to unscramble the secret orders being flashed openly over the air waves by the Germans. In the end, allies cracked the code only by stealing one of the machines. With ULTRA ENIGMA 2.0 stealing the machine won't do your enemies any good at all. First, the New ENIGMA is a thousand times more complex. Yet it only takes a matter of minutes for you to lock up whole directories of your secret files securely. Then your secrets are safe. They are secure, Now and Forever. Your secrets are safe because there is no place for cryptologists to begin, no way they can tell which part of the code is part of the secret and which part is garbage, no way of telling if the file is long, or short, or a drawing, or a picture, and it might even be in a foreign language for all they know. Yes, the new ENIGMA really can encode drawings, pictures, X-Rays and absolutely anything else you can put into a computer. Can You keep a Secret? With ENIGMA you can... ENIGMA is so secure that not even the producers can crack your secrets open. ENIGMA is seamless. Nobody can crack the codes you set but you. Now that's a Secret you can tell everybody! Your clients will be glad to hear it, and you'll sleep better knowing it is true. Let us spill out the Secret Details of ENIGMA for you to examine. Take just a moment to glance through our pages. We'll show you how it works, and explain why it works. Then, especially for Governments and other high risk situations,, we reveal why even the weak link, (knowing the encoder) can be eliminated with a Fortune Cookie blindly selected from a randomly available jar with thousands of cookies shuffled back and forth at the company. Think about it;, if YOU don't pick the keys, how can ANYONE guess which keys You Pick? And we are sorry, but NO... the company won't have any idea which keys you pick either..! -- Think of it this way, some things are best kept a secret between you and you. As an added bonus, we'll also show you some other professional ways you can guard your secrets. http://www.enigma-co.com will bring you to our front page. ENIGMA 5525 McMurtrey Drive North Little Rock, AR 72218-5248 For Support use these numbers http://www.enigma-co.com Phone (501)758-8040 8am-10pm CST Fax (501) 758-8016 All our sales are maintained by WorldWide Sales Depot So,,, For Foreign Dealership information, Sales and Orders .... use these special numbers 104344.2000@compuserve.com Fone: (401) 945-4262 ** FAX: (501) 945-4203 Sales literature, web page design and layout © copyright 1996 by WorldWide Sales Depot -- "Arkansas Showcase" lists the major links, features, fotos, and fun you can have outside on the run in Arkansas. Drop by and sign my guestbook posted at http:www.cris.com/~Talewins ------------------------------------------------------------------------- Steven Weller stevenw@best.com "There was really no reason why we did anything the way we did. But, of course, there was a reason why we did things for no reason at all". -- Michael Palin

Other than the fact it is probably from a front for one of Dan Lassiters' Little Rock companies, now owned by Alltel, it's worth a read. large scale enigma encoding is not bullet proof, but it can make your life miserable. I did not take the time to calculate the permutations... I wonder if anyone told them the data recovery teams can pull multiple layers of data off a disc after it has been stripped? FYR, the explanatory text from their front page is below. -- Cyberspace and Information are Freedom! FUCK your WIPO, too. -attila ====================== forwarded message ====================== <HTML><HEAD><TITLE>Enigma Welcome Page</TITLE></HEAD> <CENTER> <IMG SRC="eng2.gif"><BR><BR> </CENTER><CLEAR=ALL><HR><BR> <CENTER><B>Welcome to Enigma & Co.!</B></CENTER><BR> The following text contains various terms that you may not be familiar with. Please refer to the Glossary section for a description of those terms, or feel free to call us for more detailed information on how we can help you with your data security needs.<BR> <BR> A data protection system for businesses and individuals, the Enigma & Co. related products offers security with the means to create personalized encryption schemes in an infinite variety. In addition, the versions include a complete package of security management tools to enable it to be used in a business or office environment under the oversight of authorized administrators. It also provides routines to handle binary encryption and decryption of both text and non text files as well as all the capabilities needed to accommodate BBS, E-Mail and Internet communications. It is for these reasons plus many more which you will discover in using the software why our users think it is the finest cryptographic software ever produced.<BR><BR> In addition, unlike public key and other mathmatical cryptographic programs, there is nothing in the messages and files you encrypt that aids in the deciphering of your data. If you encrypt twenty bytes, then the encrypted file is twenty bytes, containing no clue on how to decipher it.<BR><BR> <B><CENTER> About Enigma & Co.'s Cryptography Products</B></CENTER><BR> Here's some insight into the enormous power and security offered by Enigma & Company's products. You do not need to know all the in's and out's of these features to use it effectively. We've designed our systems to be extremely easy to use. Some of the main features are:<BR><BR> <B>Wheels:</B><BR> Our Enigma's can use from three up to eight wheels at a time. A Wheel is a scrambled dataset of characters that is used by the Enigma systems that your computer randomly creates. There are no limit to the number of WheelSets (datasets of wheels) that you can create. <BR><BR> <B>Usable Characters:</B><BR> Our Enigma uses 83 characters on its text wheels and 256 on its binary wheels. This gives the Enigma user more than six billion more starting text wheel configurations ("shifts") to choose from, each one of which will produce an entirely different encryption. The use of all eight binary wheels, of course, exceeds this number tremendously. <BR><BR> <B>Indicator Word:</B><BR> To make the enciphered message even more difficult to break, our software provides another feature which allows the sender to enter a word or a simple phrase that has the effect of adding a virtual ninth wheel to the text enciphering combination.<BR><BR> <B>Multiple Cryptions:</B><BR> Probably one of the best features of the Enigma products, you have the means of storing your personalized WheelSets and your Schemes and then do cryptions in a multiple fashion, using different WheelSets, different Schemes, and if in text mode, different Indicator words. You can also Cross Crypt, that is encrypting in text (83 character) and then in binary (256 characters). <BR><BR> <B>Parameters:</B><BR>We created even more power over the cryptive process by adding parameters for both Text and Binary which allow the user to define the direction the wheel in each slot will rotate, and the number of turns before it triggers the next wheel to rotate in its predetermined direction. Predefined WheelSets and Schemes are also included as well as data files to save and restore parameter settings. <BR><BR> <B>Passes:</B><BR> The Enigma systems allow the passing each character back and forth as many as 99 times, a device which effectively turns an eight wheel encryption to a 792 wheel encryption or a 891 wheel encryption with an Indicator Word. <BR><BR> <B>Personal Schemes:</B><BR> Added to the above, the Enigma user is not confined to the wheel "wirings" that come with this software. He or she is encouraged to create personalized wheels and schemes, setups that can be tailored for groups of correspondents or individuals. And to avoid the possibility of using the wrong scheme with the wrong person, Enigma allows each special setup to be given a separate file name for later recall.<BR><BR> <B>Slots and Shifts:</B><BR> Each user has the ability of placing different wheels into the slots in whatever order they prefer and then shifting them prior to the cryption process. The act of shifting can in effect create a totally different wheel from the original positions of that wheel.<BR><BR> <B>Shift Ratios:</B><BR> To further complicate the encryption process you can specify the number of shifts the wheels will rotate when it is triggered instead of only one rotation.<BR><BR> <B>System Files:</B>All your system files can be removed (cannot be recovered), transferred and restored either all at once or individually. The system files consist of WheelSets, Schemes, Parameters and Code Book data. <BR><BR> <CENTER><B> About Enigma & Company's Ultra Enigma</B></CENTER><BR> The Ultra Enigma system evolved by the addition of a ten numeric input 'key' in the parameter screen. These ten sets of numbers are used to 'shotgun' the original message anywhere between eight and five hundred plus times its size, depending on the values in those ten 'key' inputs. Ultra hides your data in a sea of data, thus making decoding by brute force an absolute nightmare. <BR><BR> As our system evolved, three modes of cryption were developed and all three are present in Ultra Enigma and can be utilized as part of the operating system. Styles 1 and 2 are one-to-one processing (files are not expanded).<BR><BR> In addition, all sensitive data files used by Ultra Enigma can be Transferred, Restored and Killed (unrecovering them are impossible) leaving your computer useless to theft and misuse.<BR><BR> </BODY></HTML>

The address you mailed to is no longer valid. This is probably because the user in question was an old Open Net subscriber. Open Net is NO LONGER an ISP, and has not been since May 1996. We have no redirection address for that user. Please remove them from any mailing lists you might have. This response was generated automatically.

The address you mailed to is no longer valid. This is probably because the user in question was an old Open Net subscriber. Open Net is NO LONGER an ISP, and has not been since May 1996. We have no redirection address for that user. Please remove them from any mailing lists you might have. This response was generated automatically.
participants (3)
-
attila
-
Open Net Postmaster
-
Steven Weller