Crypto Kong penetration.
-- 2 Since release there have been a very large number of hits on the Kong documents, and mere 102 downloads of the program, and 74 downloads of the source code. The large number of source code downloads indicates that I am only reaching the crypto techie audience, that for the most part is already able to use PGP, not the non tech audience that Crypto Kong was designed for. On my web page I have documentation as to how business users can and should use this product. (See the section "contracts and certificates" <http://www.jim.com/jamesd/Kong> I and Mather Cromer have prepared a release document targeted at business users (See below) Does anyone have any suggestion of how to get the message in front of the target audience? (press release oriented towards businessmen follows: -- Announcing Crypto Kong. Free digital signatures and encryption. <http://www.jim.com/jamesd/Kong/Kong.htm>. Many businessmen use a faxed signature for a contract, or for authority to act, or worse still, a shared password, as stockbrokers often do. This is almost worthless. The signature on a fax can be, and often is, a mere bitmap, not genuinely scanned in from a signature written in ink on a paper document, but merely applied digitally to an image in computer memory. If that bitmap was also applied to some other document sent to the same company, which it usually was, then the fax proves nothing. On the other hand, often one cannot wait for FedEx to deliver signed documents. The answer is digital signatures and encryption. With digitally-signed electronic documents, you can send unforgeable signed documents instantaneously across the globe. Crypto Kong is easy to use and it uses the same identity model that as businesses today use for ordinary handwritten signatures, unlike other products which impose their own different way of handling identity. Crypto Kong takes away the hassles of certificate management, public key authentication, and complicated operating instructions. Anyone can immediately use it to sign documents, to compare signatures or to encrypt sensitive messages. Kong compares the signatures on documents, rather than comparing a signature against certificates. Crypto Kong software makes it easy to send or receive digitally signed documents or use top grade encryption to keep messages private. Crypto Kong provides support for contracts and the documentation that accompanies transactions. The Crypto Kong application and detailed documentation information is available as a free download from the Kong home page: Kong is compatible only with Windows 95 and Windows NT. Complete source code is also available for download from the home page. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG SgQ8pgY/MeQpI9CfGR5kSsRdW61mSVYtqHkEMoMU 47jSLQPPmYxhaKH9MyohUU9Q9i3bzVWjwey/s3Od4 --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG gME+6HSq3N3G1iw88pJyVqcNc8dlMZhS2f+zUijA 4IpLFuTI1zY7tEU4+gDAFM6uhgcWP9IyA/3guXt7j 4WRob8mo+81LCLSyU4RiPNOilXHZTlyvZzsFMr+9d --------------------------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the state. http://www.jim.com/jamesd/
"James A. Donald" <jamesd@echeque.com> writes:
-- 2 Since release there have been a very large number of hits on the Kong documents, and mere 102 downloads of the program, and 74 downloads of the source code.
The large number of source code downloads indicates that I am only reaching the crypto techie audience, that for the most part is already able to use PGP, not the non tech audience that Crypto Kong was designed for.
My first recomendation would be to change the name. Quickly. Cheers, Julian.
On Wed, Jan 14, 1998 at 12:49:52PM -0800, James A. Donald wrote:
-- 2 Since release there have been a very large number of hits on the Kong documents, and mere 102 downloads of the program, and 74 downloads of the source code.
The large number of source code downloads indicates that I am only reaching the crypto techie audience, that for the most part is already able to use PGP, not the non tech audience that Crypto Kong was designed for.
Ummm why reinvent the PGP wheel in an exclusively Win32 form? PGP (at least 2.x) has undergone peer review and seems secure. Is that true of your system? I don't wish to sound too negative and there are interesting features (small EC keys for one and smaller signatures). Another interesting and similar program is Pegwit which is portable code and also has these advantages. Pegwit http://ds.dial.pipex.com/george.barwood/v8/pegwit.htm But there is an intrastructure of PGP key servers and most people have PGP keys, already. Maybe we should be building on standards rather than building new ones. Of course PGP isn't GPLed but we will have g10 soon which will be real freeware and developed outside the USA to avoid legal problems ftp://ftp.guug.de/pub/gcrypt/g10-0.1.3.tar.gz Its *very* prebeta but maybe will become the cypherpunk program of choice. There is also a freeware SSH ("Psssst") planned I think by someone else. -- Steve
participants (3)
-
James A. Donald
-
Julian Assange
-
Steve Mynott