Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

Secure email info for the newbies

Yes

Don't say anything in an e-mail you would not want to be repeated in court. That is just the truth, scary I know but especially now I am glad the govt., has that kinda power. Even if you erase your hard-drive their are agencies that can still pull the information off of it. I have the programs to do it! Scary Crap!
 
Re: Sorry to burst your bubble

superset69 said:
Guys,

I am a senior systems engineer and let's just say I do Govt e-mail support. The ONLY encryption methods available in the US are the ones the US approves and they are they ones the US has the keys for. They can open ziplip mail just as easy as hotmail!!!!Don't let anyone tell you otherwise. Carnivore ladies and gents makes copies of all e-mails and just like phone calls they look for stuff like bombs and stuff like that!

With all respect, I do not agree. Elite mail is not based in the USA, so the government could not attach Carnivore even if they wanted to. Also, if the government is so good at decrypting mail, why couldn't they stop a plane from crashing into the Pentagon? I think the Elite system is pretty good protection and I wish all of you would use it.

Get it here:
http://www.elitefitness.com/mail/
 
Last edited:
Re: Re: Sorry to burst your bubble

George Spellwin said:


With all respect, I do not agree. Elite mail is not based in the USA, so the government could not attach Carnivore even if they wanted to. Also, if the government is so good at decrypting mail, why couldn't they stop a plane from crashing into the Pentagon? I think the Elite system is pretty good protection and I wish all of you would use it.

Get it here:
http://www.elitefitness.com/mail/
i have elitefitness email :)
 
September 25, 2001

Disputes on Electronic Message Encryption Take On New Urgency
By JOHN SCHWARTZ
The attacks on the World Trade Center have reawakened a debate on how strongly the public — and by extension terrorists and other criminals — should be able to encrypt their electronic messages.

The technology of scrambling data and messages has become a crucial element of computer security for businesses and consumers alike. Officials of law enforcement and intelligence agencies have long warned lawmakers that they were unable to break the strongest encryption products, and that crimes eventually would be committed that might otherwise have been prevented.

"We can give our codebreakers all the money in the world, but the technology has outstripped the codebreakers," said Senator Judd Gregg, Republican of New Hampshire, who has met with Attorney General John Ashcroft and other officials to get encryption limits on the legislative agenda.

The F.B.I. has not said publicly whether the hijackers who attacked the World Trade Center and the Pentagon even used encryption to cloak their communications. But Philip R. Zimmermann, the creator of one of the most popular encryption programs, known as P.G.P., for Pretty Good Privacy, said that he would be surprised if this were not the case.

"I just assumed somebody planning something so diabolical would want to hide their activities using encryption," Mr. Zimmermann said.

Senator Gregg said he will not make a specific legislative proposal until he sees what Attorney General Ashcroft includes in the final version of his broad anti-terrorism bill. But he said he wanted to see legislation to order encryption companies that sell products in the United States to include a back door that would allow government access when "a bad guy or a terrorist" uses encryption. "Law enforcement agencies, after pursuing proper law enforcement restrictions, will have access" to the encrypted data, he said.

Proposals for such systems, known as "key escrow" because a key that unlocks encrypted messages would be stored and made available to law enforcement, were the subject of bitter debate in the mid- 1990's. The Clinton administration proposed a technology popularly known as the "Clipper Chip" that would provide back- door access for law enforcement, and also restricted the export of strong encryption products by American firms.

Over time, however, the administration's two-pronged encryption initiative failed. Companies and consumers said they would not use a product that had government access built in, and argued that criminals surely would not; the trove of escrowed keys, they argued, would itself become a prime target of hackers and spies.

Also, encryption companies were able to show that foreign competitors were already producing strong encryption products that rendered any export ban useless. By the end of the Clinton administration, the Clipper proposal was dead and the export controls were largely lifted.

To experts like Dorothy E. Denning, a professor of computer science at Georgetown University who supported the Clinton administration's key escrow efforts, the issue was properly settled and should not be reopened.

"We had all those debates a few years ago at a time when we could rationally debate it — the consensus really emerged," said Professor Denning, "that regulating encryption wasn't the right thing to do."

But Senator Gregg argued that the issue should, in fact, be reopened. "This is an attempt to find a functional approach to this that both sides can agree with," he said.

He is recommending that Congress create a "quasi-judicial" body appointed by the Supreme Court that would handle subpoenas for encryption keys to avoid one of the objections to the original Clinton administration plan. But he also acknowledged that criminals and terrorists would find alternatives to any escrowed system.

"Nothing's ever perfect," he said. "If you don't try, you're never going to accomplish it. If you do try, you've at least got some opportunity for accomplishing it."

For Mr. Zimmermann and many other programmers who have brought encryption products to market, the Sept. 11 attacks brought reflection on the balance between the good uses of encryption and the bad.

"Did I reexamine the question? Of course I did," he said. "But after some reflection, the conclusion is still the same."

"I have no regrets," said Mr. Zimmermann, whose product was distributed free of charge via the Internet. "I did this for human rights 10 years ago, and today every human rights group uses it. And I feel very good about that."

A newspaper article last week suggested that Mr. Zimmermann felt guilty about P.G.P., but he said the account, which appeared in The Washington Post (news/quote), misrepresented his views; he had only said that he felt bad that his technology might have been used for evil ends, "the way that the Boeing (news/quote) engineers felt bad that their airplanes were used" to commit the attacks, he said.

Last week a group of 150 civil liberties organizations from across the political spectrum urged lawmakers to consider with caution any measures that might reduce the rights of citizens. The coalition stressed what, in a statement, it called the "need to consider proposals calmly and deliberately with a determination not to erode the liberties and freedoms that are at the core of the American way of life."
 
FYI, Zimmermann is now on Hush's board. Hush powers Elite mail.
 
Top Bottom