Graphic encryption
Rev. Mark Grant
mark at unicorn.com
Fri Oct 6 09:35:14 PDT 1995
On Fri, 6 Oct 1995, Lucky Green wrote:
>And by the way, "proprietary" algorithms are generally junk and should not
>be relied upon by security concious individuals and businesses. Only
>algorithms that have undergone extensive peer review should be considered
>for use.
It's OK, when these guys were spamming Usenet a few weeks ago with their
product announcement (admittedly, they did at least keep it to comp
groups) they said it was export-approved. Therefore, it can be pretty
much written off from a security standpoint - it's at best as good as
40-bit RC4, and I sure wouldn't use that for secure communications.
I'd still like to know how it works so we can see just how insecure it
is, though.
Mark
More information about the cypherpunks-legacy
mailing list