Network Associates Gives Up Search for PGP Buyer 180
nakhla writes: "I came across this article which states that Network Associates has given up the search for a buyer for its PGP division. The company has laid off 18 workers, and plans to continue to maintain the product for one year. It's a good thing that there are still products like GnuPG and others out there for people who need cheap, reliable encryption."
Sad.. (Score:4, Interesting)
Re:Sad.. (Score:3, Interesting)
Er, what happens to all the files people encrypted with PGP ten years from now when their personal versions no longer run on the new OSs? If PGP Personal Security is rendered obsolete, will there be a way to retrieve those files, or should they be unencrypted now and re-encrypted with something that is going to stick around?
I've got some pretty important .pgp files lying around. Should I switch to something else or am I not understanding something here?
Re:Sad.. (Score:1, Informative)
Re:Sad.. (Score:2, Informative)
Re:Sad.. (Score:2, Flamebait)
Re:Sad.. (Score:2)
It's probably quite worth getting gpg and seeing if it can work with your keys and encrypted files. One thing to note is that gpg doesn't support all of the algorithms that PGP used, because of patents/licensing (IDEA being an obvious example). So if you used those algorithms there's a serious risk of bitrot.
If gpg works OK with the files then you're safe as it's not likely to go away in a hurry. Keep the source around just in case though
Get your idea.c here (Score:2)
It used to be that one could just find a file named idea.c in the contrib directory of the primary gnupg ftp repository, but they were forced to remove it. You can find the idea.c in the contrib directories of mirror sites in countries that allow the distribution.
The idea.c [gnupg.dk] file and it's detached signature [gnupg.dk] made by Werner Koch.
NA made PGP into bloatware! (Score:4, Informative)
it comes with some nice extras such as a very nice firewall
And that is partly the reason nobody bought it.
PGP evolved into a nice e-mail encryption program. NA added so much crap to this (VPN that hardly worked, Firewall, hard drive encyption) they forgot there core market..... secure E-MAIL and convincing people that it was nessisary!
(In a corperate enviroment, people alredy have firewalls etc... NA just made PGP more complex)
I actually bought a version of PGP Personal Security 7.0.3
YTC !!!
NA never published the source code for version 7. That was the reason Phil Zimmerman left NA.
Version 6.5.8 could be downloaded [pgpi.org] as freeware and is every bit as compatable!
The freeware versions miss out something (Score:2)
NAI dropping this is going to seriously shaft them! There are some alternatives, but the transition is going to be expensive. Even the change of user licenses will cost over 1 Million pounds for a couple of my clients.
Mixed feelings (Score:5, Informative)
I've got mixed feelings about this. On the one hand, PGP was revolutionary and is probably one of the main reasons encryption is as free and available today as it is. If Phil hadn't released that (at the expense of considerable suffering), I suspect that the governments of the world would have been able to clamp down on encryption big time, and all of us law abiding types would take it as an axiom that none of us really need anything like that, only terrorists do. It's sad to see the company that was carrying that torch give up on it. I fear this is just one more indication that personal encryption of e-mail and such isn't really going to catch on with the masses.
On the other hand, NAI's not been a perfect angel. Phil left them because of differences about releasing (if memory serves) source code-- not because Phil is an open source advocate per se, so much as for reasons of being able to verify the security. And, myself, I'm an open source geek and have been using GnuPG for quite some time as my encryption software of choice. There still is hope that GnuPG will be turned into something that can catch on with the masses (just like there's hope, however faint, that things like GNOME and KDE will catch on with the masses).
-Rob
Re:Mixed feelings (Score:2, Redundant)
Is there any way that GnuPG could be built with a nice GUI for Windows? The fact is that for the time being, encryption will be worthless if the Windows users can't get the software.
Re:Mixed feelings (Score:3, Informative)
I use it quite a bit to sign emails and the interface is pretty clean, too.
Re:Mixed feelings (Score:2, Informative)
It's beta, but if you use Outlook, it seems to do the job very nicely. If you go to the GPG page, there is also a link for another program that is a plug in for outlook express.
W
gpg (Score:2)
Windoze Privacy Tray - AKA WinPT (Score:2)
Re:Mixed feelings (Score:2, Interesting)
My dad installed a dual-boot windows 98se RedHat linux system yesterday, after building the computer, with no prior computer knowledge and a couple hours of phone support with me. He might have trouble with ls and cd right now, but he's starting to understand a filesystem/directory structure. I bet in a year or two he'll be writing encrypted email on linux, now his primary business OS, and maintaining a secure business. He's also converting his winmodem over to external serial modems and setting up another dual-boot linux system for dial-up web access at both his home and business, upgrading staroffice 5.2 to OpenOffice 641C on all platforms (windows and linux) for MS compatibility, and this time around its costing him less than $1000 for the latest technology, 1.6+Ghz system, G-Force 2, etc. I'm very proud of my dad. But he's no exception, he's just like all the other "computer illiterate" people out there. They're not computer illiterate(sp?), they just need a little help to get them started and lots of encouragement. That's all.
Re:Mixed feelings (Score:2)
Is there any way that GnuPG could be built with a nice GUI for Windows?
That's probably the most critical ingredient, and one which other responders to this post have already addressed.
But has GPG been ported to the Mac? I'd imagine that OS X would be pretty easy, but I know of some friends that run some pretty crusty old versions of MacOS that would still be out of luck.
who feels suspicious about this too? (Score:2, Insightful)
Lots of products left allright, but easy to use? (Score:2, Informative)
/Pedro
Re:Lots of products left alright, but easy to use? (Score:1)
/Pedro
Re:Lots of products left alright, but easy to use? (Score:2)
Oh that's JUST how I want to get "average joes" using encyrption on e-mail. By building up big freaking attachments and slinging the attachments around, forcing the recipient to download the attachment, save it, decrypt it, and load it in $APPLICATION.
Are you stoned?
Re:Lots of products left alright, but easy to use? (Score:2)
He doesn't realize that half the non geeks only attach documents to an email by using Word/Excel/Powerpoint's "mail this document" feature. I couldn't tell you the number of times I've had to show people how to attach a another kind of document (like a picture).
Re:Lots of products left alright, but easy to use? (Score:2, Funny)
/Pedro
It's a shame (Score:3, Interesting)
This is the reason I am always concerned when a major company snatches up some cool new technology; they see it in major use by techs/geeks/etc, and think, "hey, with some good marketing...". They fail to understand what features matter to the original audience, fail to capture a new audience, and then drop the product.
In the meantime, it strands people who used to like the product. I was a major PGP user since its inception. Now, I can't stand the darned thing. I tried the Palm and Pocket PC versions, I tried the Windows versions. They added too many toys and widgets to a small, light application.
Oh well. I hope the Gnu PGP clone keeps up.
-WS
High Profile Use Case (Score:3, Insightful)
I really dont think that the average consumer is concerned about having their private messages intercepted. (The logic is usually: "I dont do anything bad. Hey, waitaminute. Why are
That being said, I'm not surprised that it was difficult to find a buyer for them. The market really hasn't encountered the high profile case that justifies wide spread deployment of PGP use. I think
Re:High Profile Use Case (Score:3, Informative)
A good use case would be a major bennie, but I think you're coming at it from the wrong end. PGP isn't just used to encrypt/decrypt messages. The canonical four tasks:
Rather than looking for situations where PGP prevented someone from intercepting a communictation - often very difficult to know ever happened - I'd be looking for case studies in which someone tried to tamper with a message and was foiled because of the PGP signature, or tried to forge a message... you get the idea.
Re:High Profile Use Case (Score:2)
Re:High Profile Use Case (Score:2, Interesting)
Re:High Profile Use Case (Score:2)
You are assuming that the email is being intercepted and that the intercepting party knows who the sender and recipient are. You also assume the "abusive government" has access to the sender, hence the fear of torutre and death.
If I were the "abusive government" I'd arrest the sender tourture them, for the key, then kill them. Problem solved.
I doubt Anmesty International uses PGP for this very reason. Steganography is much better suited to this sort of application. As long as you don't do stupid things like email the same penguin.jpg back and forth it is much less obvious you are trying to hide something.
Then again AI is a bunch of liberal thugs who think they are smarter and better than *everyone* so they might just be that stupid.
Re:High Profile Use Case (Score:2)
With enough time and effort a Government should be able to brute force a key.
But it's a lot of time and effort and even the US government can't go breaking all of them.
govt's would certainly prefer everything was sent in easy-to-read ASCII
Re:High Profile Use Case (Score:2)
PGP is a joke (Score:3, Insightful)
Re:PGP is a joke (Score:2)
Well I'm hardly an expert (I can deploy crypto, but I wouldn't be comfortable implementing it), but I do know enough about crypto to know that there's a lot of snake oil out there, and that it's easy to accidentally (or deliberately) leak bits.
Since I'm not an crypto expert (or an expert in reading disassembly) it's even more important to me that as many people as possible who do know what they are doing are able to look at the source without too much trouble.
I had a look at your website and I would strongly recommend that you get your mommy to hit you very, very hard with a Cluestick(tm) before you go to bed tonight!
I'm well aware that my website sucks.
For fuck's sake: A business card with a public key printed on it. If any sorry-assed geek handed me one of those I'd shove it up his nose.
It's to promote awareness of security issues. Besides, business people are amazed by 'cool tech stuff' they don't understand, and security people have a use for this information.
Re:PGP is a joke (Score:2)
When you get my public key from the key servers (using the ID), you can check it against all these parameters to make sure the key you just got is actually my key.
What difference will it make? (Score:5, Funny)
I'm glad the option is there, and I know it's done a lot of good in a lot of places, but even using e-mail encryption automatically draws attention to yourself. It would be far better if everyone used it for every e-mail they sent. It would be great if keysigning and verification was a normal event in meatspace, but it just isn't to be. How is it that SSH and OpenSSH became so widespread but PGP and GPG haven't?
I think it's because PGP and GPG have such a sucky interface. It takes me forever to read the manual every time, and the integration with current mail programs sucks! Evolution seems to be fixing this and I know mutt and pine can support it, but it's just too much work to setup if no one else you e-mail can do it too!
Is there any hope? I'd like to think so, but only if it becomes the default in hotmail and MS Outlook will it become widespread, and what are the odds of that? *sigh*
Re:What difference will it make? (Score:2, Interesting)
The problem comes when the person at the other end doesn't grasp public key encryption - which still seems a sticking point for a lot of people. Maybe they should teach it at High school?
Re:What difference will it make? (Score:2)
PGP's Outlook Plugin sorta works, sure, but it tends to bork on HTML mail and attachments, doesn't prove UI information about encryption/signing, and requires all sorts of external windows to pop-up, produces wierd error messages, and sometimes just goes south for no reason.
Woefully, this is as good as it gets for PGP (at least on Windows), which is probably a big reason it never really caught on. And this is from someone who really wanted to use it and just got sick of all the bugs.
In my experience, when you have seemlessly integrated encryption (like SMIME in Outlook or the Lotus Notes stuff), even the lusers start to use it with glee.
Re:What difference will it make? (Score:5, Insightful)
That's the trouble with encryption, and security in general. It takes effort to be secure. You can trust an algorithm with your life, but do you trust the piece of software you installed on the computer you assembled out of parts you bought off the shelf? Sadly, strong encryption built as a default into something like Outlook might cause more trouble than its worth, in misplaced trust.
Most Outlook users wouldn't know how to tell if their private key had been compromised by some email malware. If they're using email for tasks that SHOULD be kept private because they trust that Outlook will make it safe, then where will we be?
Re:What difference will it make? (Score:2)
Agreed 100%, but generally I can sit down at a default install of Red Hat and know that I've got a cryptographically secure /dev/random, and a port of OpenSSH sitting right there waiting for me to use. Its cake to enable an ssh server, allowing remote access and file transfers.
All the normal user has to do to increase security over telnet is type ssh instead of telnet. E-mail needs to be the same way! They should just have to click one button and be more secure. Yes, this gives some illusions, but if we can make e-mail slightly more private from prying eyes it is worth it to me.
I'd have a hard time trusting my life to any software at all, but I'd have no problem trusting that encryption would at least keep a prying sysadmin out of my email! :)
Re:What difference will it make? (Score:3, Interesting)
Absolutely. There are two huge problems. Firstly, it's easy to use things like PGP and set things up so that it's easily crackable. That requires knowledge (at all levels, from something as simple like making sure your private keys are only accessable by you, to the code using decent random generators).
Secondly, you have to care about being secure all the time. One lapse and you're wide open. This is an even bigger sticking point for the masses. Just the other day I was ranting about certain programs (I won't go into which ones here), and for each one of my main reasons for not using them was security or privacy concerns. The person I was trying to convince noticed that and basically asked why that was a big deal. This kind of took me by suprise, and so I did a quick poll of other reasonably computer literate friends (they would all know about PGP for example). Sure enough, most of them do not care if files on their computer can be read, so long as damage isn't done to the PC, etc, etc. I don't understand it, but it appears people are like that.
One random thought is that really email could do with a big overhaul. SMTP, email format, all kinds of aspects. Building encryption and authentication into that from the start would make things a hell of a lot cleaner and help make the above problems less of an issue. But sadly I think I'm dreaming that that will happen any time soon.
Re:What difference will it make? (Score:2)
Malware like Outlook, for example?
Re:What difference will it make? (Score:2, Interesting)
Re:What difference will it make? (Score:2)
Then there's the fucking hushtools.com site (which I've tried under about four dozen different combinations of browsers and java runtimes under Windows 98 and Linux) which has never worked for me, so I can't even get the public keys of hushmail users! If I can't get the damn public key, what's the point?
I don't know what Hushmail is trying to pull, but they're definitely incompetent. Perhaps deliberately so. If someone's got the CPU power to run a java runtime (pretty much any commodity PC made in the past 6 years) they've got the CPU to run PGP or GPG.
About the only use I can think of for Hushmail is for other people to not know that you use PGP if your computers are ever confiscated. Although, even then, it's easy to fit GPG on a floppy.
Re:What difference will it make? (Score:3, Insightful)
Re:What difference will it make? (Score:1)
If you really think so, take a look at Cypherus [cypherus.com] by APMSafe.com. We designed it to be really easy to use, for exactly that reason. Granted, it's currently Windows-only, and closed-source, but I imagine that works for alot of people. When I was still working there, we did a whole lot of work with windows internal stuff to be able to get it integrated into everything from your desktop, to Eudora and Outlook, to even Outlook Express (which we didn't even think was possible, at first). Check it out.
-Andrew
Re:What difference will it make? (Score:2)
Have you tried Evolution [ximian.com] yet? It integrates as seamlessly with GPG as PGP does with Outlook. All you have to do is type in your passphrase after you hit 'send'.
Re:What difference will it make? (Score:2)
There's a program called sea-horse that I've tried that provides a very minimal gui frontend for gpg, but like I said, not worth the effort for me to use it yet, but here's hoping!
Re:What difference will it make? (Score:2)
David
Re:What difference will it make? (Score:2)
When i even sign my mail with a gpg in evolution, my mail looks like an attachment in OE because it cannot handle the "unknown" mime headers. I communicate a lot with email in company where i work and use gpg and there's been a lot of complaints when people cant reply to my mails because the body of my own email is readable only in notepad (yeah, like they give a fuck about correct quoting..). One moronic who had installed some bizarre movieplayer, tried to open my mail in it because OE was suggesting it. Cant belive the look in my face when he dropped by to my cubicle to ask, what was the video about that i send him.
Anyway, GPG integration in the evolution can't get simplier. Well, it can if it would integrate gey generation and key imports but signing and encryption is working totally transparently. You just enter your public key id into account settings and voilã.
Encryption Crackdown? (Score:4, Interesting)
Quite an interesting point - why would they give up on such a good product like this? And who could gain from them giving up a product like this?
laid off (Score:1, Offtopic)
Better deal? (Score:2)
If they arn't going to activly try and sell the product, how is this a better deal than taking the less appealing offer?
PGP app user interface (Score:3, Interesting)
A friend of mine tried to use the freeware NA windows version. Hes a typical windows user and won't read instructions. After giving him a five minute talk saying "Other people use you public key to write messages to you, only you can read the message with your private key etc". Days later I call in at his house and he had not managed to use it. The user interface was horrible. Despite having used command line PGP for user and having a quick look at the help I couldn't find his keyring or work out how to use it from a quick look at the menus.
I can't imagine what the staff working on PGP were doing, certainly not useability
There were three background processes running on his already unstable win98 machine poping up box's demanding he type in his details and register. I think he reinstalled windows in the end. People who use PGP are gneerally a bit paranoid, annoying them by trying to make tem register seems pointless.
To be secure you _must_ RTFM (Score:2)
Hes a typical windows user and won't read instructions.
That is a bit like giving someone keys to your house and not showing them how the funny lock works
For him to send a plaintext message that he thought was encrypted (because he didn't RTFM properly) could have been disasterous. In the same way that your friend not locking your door properly ('cos he didn't know how) could be disasterous
Re:PGP app user interface (Score:2)
it started locking up randomly quite often. The common denomenator was that I installed PGP. Un-installing PGP it stopped locking up. I hand't tried it again.
Don't know what the deal was. Have not yet tried it again. I'd like to get it on my wife's XP Box but I haven't spent the effort as of yet.
The real pity of this (Score:2, Troll)
Ironically, it's probably an easier sell now than it's ever been, given that organizations are finally getting a little more security-conscious.
GPG is probably the best hope for a cross-platform replacement, but there's still a need for better snazzy front-ends on most platforms (I'm using it on MacOS X) to help Joe Average, and there's no easy PGP VPN or PGP Disk equivalent.
NAI - if anyone's listening, why not re-open the PGP codebase and let the marketplace solve the problem? Nobody wants to buy it, you don't want to sell it, so give it away!
Email Integration with GnuPG (Score:5, Informative)
Now:
For those of you lucky enough to be using MacOS X (go ahead a flame me - I've been using Unix for ten years, and MacOS X rox my sox), just grab a copy of GnuPG from Fink [sf.net] and install GnuPG.
After that, grab a copy of PGPMail [sente.ch] from Sente, and use the easy, one-drag install. It's still in beta, but it's damn nice integration.
For reference, I'm running MacOS X 10.1.3. When I send an email to someone whose public key is in my keyring, I just click the button "Encrypt" before I click send. Voila. When I receive something encrypted, I have the option of having it automatically decrypt, or I just click "decrypt" in the toolbar. Very nice.
Re:Email Integration with GnuPG (Score:2, Informative)
Check it out at http://www.cyrusoft.com/mulberry/ [cyrusoft.com]. It is payware, but it's a damn nice email client. Works on Windows, Mac, MacOS X, Linux, and, I believe, Solaris.
-c
Re:Email Integration with GnuPG (Score:3, Interesting)
The drawback is: I would like very much like to use the same e-mail client on Linux and Windows, but sylpheed is only theoretically cross-platform. On ftp.gnupg.org, there is a w32 build of sylpheed 0.4.60 which is buggy like hell, and I have no idea how it was compiled (otherwise I would rebuild a newer version).
Fatal Mistakes.... (Score:3, Interesting)
People in general, Im not talking slashot techno geeks. Have NO clue WHATSOEVER that information can be snatched from the net. I have told people they have mail bouncing only to see hen freak and become accusitory , HOW do You KNOW ?? You mean You could READ IT ? Blah Blah Blah, I look at em and say yeah but to bwe honest I could give a crap less what you write and to who. hat usually tones em down a notch.
BUT Back to the point, If someone dosent KNOW there is a NEED then there is NO market for the product , If people dont buy it because they dont know there is a need can you blame em ? If someone tried to sell you say a under the desk testicle shield for radiological effects from monitor transmission would you buy it ? a few would , but most no , WHY ? Becaues if here is no problem, the product COMPLETLEY loses its percieved value.
Now, that said they are in a bad market to try and pitch the inherent Insecurity of networks, being Network Associates and all...
Re:Fatal Mistakes.... (Score:1)
Re:Fatal Mistakes.... (Score:2)
Re:Fatal Mistakes.... (Score:2)
At one point, (about Summer 2000) NAI was still selling a decent product for about $70. It was a suite that contained a PGP encryptor/decryptor, a keyring application, and an IPSEC implementation. Everything you need, right?
So NAI split up the bundle, and upped the price on BOTH the parts so it would cost the user about $200 to get the functionality of the old version. I could understand selling the VPN seperately from the keychain, but only if both fragments cost less.
I'm not a conspiracy theorist. I don't think this was some scam to play onto Ashcroft's nice list. I merely think that there's at least one suit near the top of NAI who isn't that interested; funding cuts, perhaps inadequate time spent considering marketing, you could see how this might go.
In the end, I suspect I hope in vain that NAI will give away the codebase when they stop support. They'll probably say something about "protecting shareholder value" by hanging onto the IP forever "in case" they could sell the increasingly outdated software for more than it's worth.
Encryption and open source (Score:5, Interesting)
So, its not too surprising that Network Associates is having a little trouble trying to pawn off a product that has no market.
Exit PGP, enter GnuPG.
Smartcard support (Score:4, Informative)
Wow, useful information on Slashdot (Score:2, Interesting)
It will be interesting to see what happens now. I wonder if they will consider using GPG eventually?
Encryption and the masses (Score:5, Insightful)
First, it has to be absolutely transparent. It can't put more of an overhead on a standard email send-and-receive than already exists. Key management would have to become at least as easy as address book management (say, having addresses and keys automatically integrated into your keyring). While this would present a security hole, most users aren't going to want to go and verify keys. They're also not going to want to type their password every time they send an email. Most users of apps like Outlook just store their passwords on their PCs anyway, because they can't be bothered logging in once per session (ever deal with someone who didn't remember their password because they never type it in anymore?). IIRC, PGP had several of these features, but with some apps you still had to encrypt to the clipboard and then paste the encrypted message back into your document.
Second, to even get people to do this minimum, and to demand it in products, they have to see the need for it. Phil put it best, I think, when he drew an analogy in the docs for PGP. I can't remember the exact wording, but it was something along the lines of "So you're not saying anything illegal. What would you think if the government outlawed envelopes, and all mail had to be sent on postcards?
Most people don't believe how easy it is to read email, because they have no idea how to go about it. Instead, they shrug and say that they don't care. If instead you ask them how they'd feel about having all of their corporate correspondence and private letters going out on postcards, they'd think twice, and (hopefully) bite the bullet and start using something like PGP. There can be a huge market for applications like PGP, but it has to be sold to people with the right message, and it has to, even at the expense of some security (and yes, I realize the implications of that, and know the argument that no security is better than flawed security), be easy to use.
Re:Encryption and the masses (Score:3, Insightful)
I don't think that there's a good reason to think that making PGP easier to apply to email would make it less secure:
I'd love to hear advice as to how I can help this to happen, or find it already sitting around.
Re:Encryption and the masses (Score:2)
Re:Encryption and the masses (Score:2)
Re:Encryption and the masses (Score:3, Interesting)
Besides, if 99.9% of the mail coming into my mailbox at home was postcards, I would probably send more postcards and not worry about it. The whole reason the postcard argument works is not real concern for privacy, but comfort with cultural customs. This is also why secure e-mail will never catch on for unior sending a message to grandma. Where it will and has caught on is in security concious businesses such as medical records where encryption of electronic correspondence with patients it is now required by law (do a earch of HIPPA to see all the headaches this is causing).
Re:Encryption and the masses (Score:4, Informative)
Most people would happily use encryption if it happened automatically and painlessly. The current problems arise because PGP is not integrated and S/Mime frankly sucks, having an overly complicated UI, difficulty getting a key and is dog slow to boot.
Re:Encryption and the masses (Score:2)
is that it would take a campaign in the office
along the lines of "You know, every 17 year old
intern we have working in IT can read every email
you send if you don't use encryption" or "Your
bounced message to Mr Smith dealing with your
weekend in the country ended up in my account.
Maybe you got his address wrong?"
Maybe that's a little too in-your-face
(and, depending on the company, might get people
fired), but it will bring the subject home to people
in a way they can understand.
It's better than explaining about packet sniffing
and other things that make people's eyes glaze
over (like Carnivore).
Scare people with a dose of reality. Make it easy
to use. They'll begin to understand, and start
using encryption. After that, they'll be more
ready to adopt stronger techniques.
pgp and key lengths (Score:3, Interesting)
Finding the people to verify PGP is secure and proving that any new method of encryption is secure takes money, and since many people still consider zipping a file up with a password as "strong encryption" there was no market for it.
To think, not to long ago the US govt. was complaining that the world would end if we all had encryption. As it turns out, few cared enough to use it.
Bollocks! Key lengths not a problem (Score:2)
shows that any key less than 1024 can be "easily" cracked.
eh?
Yes some weeknesses have recently been discoverd in the RSA algoritham meaning that 1024 bit keys are less secure than people thought. HOWEVER PGP defaults to a 2048 bit Diffie Hellman (sp?) key.
Not only that but PGP will happly accept DH keys up to 4096 bits (and RSA keys to 2048 bits if you are set on using RSA), just by changing the defaults!
I think your comment is missleading. Standard PGP keysizes are secure (and should remain secure for many more years) but uping the keysizes can be done very easily!
Re:Bollocks! Key lengths not a problem (Score:2)
NAI Another Commodore? (Score:2, Interesting)
personally, don't see much difference between that and what NAI has done
to the companies/products is bought/merged.
Where I work we use McAfee VirusScan and the Gauntlet firewall. At home,
personal use only, I use PGP. (Good ol' 2.6.) Since NAI raised its ugly
head:
. Working with McAfee has become more difficult in nearly
every respect, in my experience.
. The Gauntlet firewall product has become so bad, particularly
the support, that we gave up on it. (We're still using it. We just
haven't bothered with (non-)support contracts or "upgrading.") I
used to love that product
company to work with.
. When I tried to license PGP for business use, not only did
NAI not have a Unix version for sale, they had no mechanism whereby
I could license the "open source" version for business use. Think
of it: basically free money for them. They had to do no more than
charge me. No media. No downloads. No support. Just me saying to
them "Here! Take some money." The concept was utterly beyond
them.
So the PGP product is now dead. Imagine that. They've sold Gauntlet to
Secure Computing Corp. God knows what the status of the McAfee product
line is.
In summary: it's my opinion that NAI has done those products, not to
mention their (ex-)customers no favours. Needless to say: NAI is not one
of my favourite companies.
Encrypted Volumes (Score:1)
Re:Encrypted Volumes (Score:2)
pgp and the NSA (Score:1)
Re:pgp and the NSA (Score:2)
Re:pgp and the NSA (Score:2)
The government will always have bigger weapons than you. It's a fact of life. I have a pistol and a rifle and they have nukes. I have PGP and they have rows upon rows of supercomputers.
But that's not to say that PGP is useless. That pistol of mine is still great for defending myself against criminals. It's also okay to defend myself against rogue agents of the government. Likewise, PGP is great for securing your email against criminals, your boss, your wife, your nosy neighbor, and does a respectable job of protecting your email against you nosy sheriff, IRS agent, numbnut judge, etc.
Does GnuPG has VPN support? (Score:2)
Re:Does GnuPG has VPN support? (Score:2, Insightful)
Re:Does GnuPG has VPN support? (Score:2, Insightful)
How much is NA asking anyhow? (Score:2)
Re:How much is NA asking anyhow? (Score:2)
Re:How much is NA asking anyhow? (Score:2)
An unrestricted PGP would allow everyone access to PGP. Since the value of PGP increases with the number of users, it makes sense to give it the least restrictive license possible. GnuPG is already GPL. Since NAI will probably dump the semi-free PGP anyway, releasing it under the BSD or MIT license would be a good idea. Those people who loathe the very existance of non-GPL licenses can stick with GnuPG, and Microsoft, Apple, etc., can start integrating the unrestricted version into their software.
The windows interface rocked! (Score:2)
For instance, if I have a truckload of files to decrypt, it goes as follows.
Select Files > Right Click > PGP > Decrypt > Input passphrase and voila!
Cooler even is that it preserves the original filename after decrypting.
Its always an annoyance to decrypt multiple files with gnupg on linux. Does anyone here know how to implement a passphrase caching mechanism so that I do not have to type that bloody lengthy passphrase everytime? I know this might be a security risk but hey, my home system is not networked. To reduce the risk of people doing stupid things, how about having to edit the source and modify something before the passphrase caching works? I am ready to do that. I am sure most seasoned gnupg users would find that useful too.
Also, how do you preserve the original filename?
Hint: to see the original filename use --list-packets with gnupg.
Simpleguy
Use biometrics NOT passwords and encryption (Score:2)
Security based on what you are (biometrics) is much more reliable and can range from voice recognition over a 3kHz phone line to DNA scans. The more you need to KNOW, the deeper (but not necessarily the more invasive,) the source. The more you need to be sure, the more biometric signatures you can use to corroberate a message.
Use a pair of biometric keys to encrypt/decrypt using the same algorithms as public key and you've got some underivable security. (The keys don't have to be primes.)
As the Beatles sang all those years ago "There's nothing you know that can't be known." So much for passwords.
And remember, encryption calculations are cumulative. Once you've worked out all 128-bit factors, cracking a code you've never seen before just becomes a table look up. (First rule of performance optimization: NEVER do anything TWICE. You can't buy a second but you can rent one if you use cold hard cache.)
And the price of storage falls every month and the number of factors calculated grows every second. (Don't think the NSA hasn't figured that out yet.)
Biometrics are not revocable (Score:3, Informative)
With a passphrase-based system, by contrast, you can just change your passphrase as needed.
I'll buy it (Score:2)
Hopefully it would come with at least one aeron chair.
mmm. Aeron chair...
Danger Will Robinson! Danger! (Score:2, Interesting)
Yeah, we will su his a$$! Well, in the meantime, you are SOL and out of business for all intents and purposes.
PGP is great for individual use. It is a far too risky for corporate use.
Re:Danger Will Robinson! Danger! (Score:2, Insightful)
If you didn't have backups of your "business critical" data, you shouldn't be in business anyway.
Bollocks! PGP has option for corperate key escrow! (Score:3, Insightful)
you can't deploy it in a corporate environment.
You ARE wrong! Read this [mccune.cc] about which PGP version to use.
Here is a cut 'n' paste of the intersting bit....
The Business versions allow you to set up how PGP will be used throughout an organization, and also allow for use of an Additional Decryption Key (ADK); but do not really include anything of additional value to an individual user. The ADK is just a master key used by an organization that all of its email/files is also encrypted to, so that if someone leaves the organization, there will still be access to his/her encrypted files - It has absolutely nothing to do with concepts such as government key recovery.
PgpAPI!? (Score:2)
It sucks to see that go. GnuPG may be free, but the source was available for PGP, and the API was just fantastic.
NAI didn't sell all of PGP (Score:5, Informative)
It all is a big shame too. The last version, 7.1, was cool. It was stable, had an IPSEC client that could talk to pretty much any VPN gateway out there in addition to creating peer to peer IPSEC tunnels with other PGP clients as well. A mini firewall / IDS rounded it out. Frankly, companies just aren't paranoid enough to require that level of encryption yet. And until that happens, no commercial product is likely to succeed in this arena.
Marketing blunder! (Score:3, Insightful)
I played with PGP when it was freeware. In a pilot project, I exchanged office gossip with a co-worker to see if ordinary people could use it effectively for secure e-mail communications. It worked quite well, but we didn't have a pressing need for the technology so deployment went nowhere.
Years later, I'm at a different company and now I have a use for it. I visit NAI to see if I can buy just the basic file & e-mail encryption. I discover all they really want to sell is the entire PGP Desktop bundle, for a price that IMHO far exceeds what basic encrypted e-mail should be worth. Eventually, I managed to buy the basic package, but only after making phone calls and finding a reseller who could do such a thing. The licensing complexities of the whole process was as if I was buying an nuclear reactor! Had this been an easier process, I might have deployed it on hundreds of PCs, instead it's only a handful.
I am the customer; I am always right. I want an easy-to-buy, easy-to-use, cheap-to-deploy package that encrypts the 5% of my users' e-mail & files that are worthy of encryption. NAI could have marketed PGP successfully to a high percentage of business and home PC owners, but for whatever reason they chose to go after the ultra-paranoid, encrypt-everything, price-is-no-object crowd instead. PGP is a great product; better management could have made it profitable. Maybe someone will buy the product and figure out how to broaden its appeal.
Use PGP CKT (Score:4, Informative)
PGP CKT, comes fully loaded with PGPDisk, and PGP4ICQ, and the plugins for Outlook/Outlook Express, I'm not sure about PGPNet, I don't use it.
NAI Privacy Policy (Score:3, Informative)
That doesn't look like much of a privacy policy to me. Hence the reason I didn't proceed.