<tried to email this, but it bounced> I too would like more info on this subject! Guess all us yokels at UNM are clueless or something. My question is, how does the recipient get the key, and how do they (she, whatever) know to use that long de command? What would happend if they didn't, just get gibberish?
The recipient captures the entire message as, say, G.ENC, then runs:
DE D G.ENC G.DEC /t
(Of course, she has to know the encryption key.) Dolphin Encrypt skips over P1 to get at C2 and writes G.DEC containing P2. Voila!
For further info send me a snailmail address.
See below for snail address... -- Testes saxi solidi! ********************** Podex opacus gravedinosus est! Stanton McCandlish, SysOp: Noise in the Void Data Center BBS IndraNet: 369:1/1 FidoNet: 1:301/2 Internet: anton@hydra.unm.edu Snail: 8020 Central SE #405, Albuquerque, New Mexico 87108 USA Data phone: +1-505-246-8515 (24hr, 1200-14400 v32bis, N-8-1) Vox phone: +1-505-247-3402 (bps rate varies, depends on if you woke me up...:)
participants (1)
-
Stanton McCandlish