a shame

  • Thread starter Thread starter obi
  • Start date Start date
O

obi

Its a shame that we have to sit and deliberate what some assbite is sending
to our computers. Before I really became conscious of what was out there I
could't believe all that my friends were telling me about the viruses,
trojans and adware. WOW sorry for the ranting.

question: Is PGP (pretty good privacy) any good?
 
Yes, it really is, but ... its main vaule is only in authen
ticating that a mail actually came from you. I do that
without PGP's added load by simply hiding little oddities
here and there in my mails, and telling my trusted sources
about them. But, if you do any "official" work, I think
it's worth it.
Pop
 
What about its wipe deletion of files...does this only apply to email or the
entire disk
 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[Rare top posted preamble]...

This reply may be considered mostly off-topic for this group, but
perhaps it's not entirely so. If anyone is concerned with the threat
of personal/private information on one's computer being compromised
via Trojan activity, perhaps the use of encryption has it's place in
"anti-Trojan" security measures.

Yes, it really is, but ... its main vaule is only in authenticating
that a mail actually came from you. I do that without PGP's added
load by simply hiding little oddities here and there in my mails,
and telling my trusted sources about them.

Hi Pop,

Having had my "identity" maliciously spoofed over the Internet
(resulting in uncomfortably close threats to my physical well being),
and also wishing to protect my privacy and the privacy of my
correspondents, I'm going to have to disagree with your somewhat
dismissive comments about the usefulness of PGP. I also feel that
your "hiding little oddities here and there" is in no way an adequate
substitute for what PGP or GnuPG can offer in terms of
authentication. The method you describe is, at best, about as
"secure" or "reliable" as ROT13 is as an "encryption scheme". :-)

First, let's revisit what you said in your first sentence above:

"... its main vaule is only in authenticating that a mail actually
came from you."

This, in my opinion, is only one thing PGP *can* do for us (if used
properly and with care), but I wouldn't necessarily call it the "main
value" of the program. Digital signatures can be used on more than
just email as well; other documents, files, and even to sign the
source of web pages. PGP deals with complete encryption solutions in
addition to digital signatures.

Verifying a digital signature *does* do one thing, and *can* do two
things...

1) It *does* determine whether or not *anything* has been altered in
the message/document/file between the moment it was signed and the
moment the signature was verified. It doesn't try to determine
just what has been altered...only if an alteration has taken place
or not. An alteration resulting in a "bad" signature verification
can be anything from actual text being altered to even something
as small as an extra blank space being added somewhere. This
"strictness" may seem rather severe, but it is also very good,
because PGP simply doesn't tolerate *any* changes made to an
already signed message, document, or file.

2) It *can* also "authenticate" the *signer* of a
message/document/file (who *may* also be the "author" of the
signed message/document/file in question), but this aspect of
authentication depends on one's understanding of the "web of
trust" (which also depends on one's trust of another's careful
usage of the program...including the safeguarding of one's private
key and passphrase).

In addition to dealing with digital signatures, PGP/GnuPG offers
strong encryption (both "PGP" and "GnupG" being implementations of
the same "OpenPGP" standard). Encryption can be used to protect
email, other types of documents or files either stored on the local
machine or transmitted over the Internet, or even for "on-the-fly
disk volume encryption" to protect databases and other stored files
on one's machine. "PGPdisk" is available for this sort of disk
volume encryption, but there are other programs available for this as
well (some free, some not).
But, if you do any "official" work, I think it's worth it.

I think the idea that "official" work is somehow more worthy of
authentication and privacy protection than "personal" work or
correspondence is misplaced. On the most simple level, would you
write a "personal letter" on a postcard and send it through the post?
Or would you *insist* on putting such correspondence in an envelope?

*Any* email that is not encrypted can be read by any number of
people; with copies being available at any number of servers it
passes through on its way from sender to recipient. In fact, an
"email postcard" holds the potential of being seen by many more
people than would ever be exposed to a paper postcard sent via "snail
mail".

I wonder how many people here send "personal, private" email messages
to friends and family yet never even consider the *fact* that people
other than the intended recipient *can*, and more often than they
might think, *do* read their messages?

Unless and until one is unpleasantly surprised by some incident
involving the "unauthorized" reading of their personal
correspondence, they may never know that others can and do read their
messages. On the other hand, we *can*, by using encryption, be
comfortable in the knowledge that even if someone other than our
intended recipient were to look at a copy of our correspondence, they
wouldn't be able to read the contents.

- --
Melissa

-----BEGIN PGP SIGNATURE-----

iD8DBQFA7xmlKgHVMc6ouYMRAufoAJ4nDpzSKbfGc4PwyI9Pex2AJHmziQCg+F7a
iU8ieyGjg3EqerZ46wtkFqY=
=GEXe
-----END PGP SIGNATURE-----
 
What about its wipe deletion of files...does this only apply to email or the
entire disk

First, please don't top post. Remove the parts of the message that have
nothing to do with your reply, and then post your responses, after the
part you are replying to.

Pgp has several wipe functions. You can use it to securely wipe any
existing file. You can use it to wipe all of the space not currently
in use by any file, that may contain the contents of files you've
previously deleted. You can set pgp to auto-wipe every file that
you delete. In my opinion, the first two are usefull, but the last
can kill performance, on anything other then top end systems.

Regarding email/usenet, pgp can be used to "sign" a message, so
the receiver(s) can verify nothing has been changed, and that the
message was signed by the computer containing the private key,
usually, with the permission of the owner<g>. Pgp can be used
to encrypt a message, so only the computer in possession of the
private key, can decrypt it.

Pgp can also be used to encrypt files or virtual disks, so only the
computer with the correct passphrase can decrypt them.

Bringing the post back on topic for this newsgroup, pgp can be used
to protect data from things such as email worms, that send a copy of
a randomly selected file, from your hard drive, when propogating.

Signing can also be used to confirm updates, and virus signatures,
actually come from the original author, and not a virus/trojan writer.
For example, you can get the public key for f-prot from
http://www.f-prot.com/company/KEY.ASC and then use pgp to
confirm the updates you download haven't been corrupted/changed,
since being signed, and that they actually were created by the
computer/person, in possesion of their private key.

Regards, Dave Hodgins
 
No arguement, Melissa, none at all. I attempted to respond
in a vein that I thought matched the OP's familiarity and
level in such matters. I may have made it a little
oversimplified, and did neglect to recommend going to PGP to
read their pretty well written hype where one can learn a
lot about it.

See my Inline, but I don't disagree with much that you
said::

Melissa said:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[Rare top posted preamble]...

This reply may be considered mostly off-topic for this
group, but
== Personaly opinion of course, but I think it's a
sufficiently relevant topic to go well with this group.
Others may disagree of course.
perhaps it's not entirely so. If anyone is concerned with the threat
of personal/private information on one's computer being compromised
via Trojan activity, perhaps the use of encryption has it's place in
"anti-Trojan" security measures.
== Definitely.
== This really needed more clarification than I provided.
I DO use PGP and also Thawte, but not as a matter of course;
they are reserved for clients and anytime important
information is dispensed. Since most of my "trusted
sources" (a misnomer, but works here) are semi-net-educated
family and friends, who don't understand much more than to
never respond to a spam and never open an attachment you
weren't expecting, and adhere to those rules, other less
technical and easier to implement methods work just as well
and avoid the added complexity (for them) of addons and
third party programs.
I won't discuss my "methods" specifically except to say
that they are nuances familiar to all of us and if they're
not readily present, we know to question the sources. With
up to date OS, av, spywares, firewall, etc., that's about
all that's necessary. Most of the people I've worked with
have no problem with things like spyware and firewalls, but
get confused by things like PGP et al. But our own little
"system" works well.
All that said, there has only been ONE instance of a
falsified email amongst us, and that one came to me from my
son, supposedly, in Ct. Other things, especially the
headers, proved it false and a phishing attempt, but
initially it was obviously not from my son due to our
methods not being present.
Hi Pop,

Having had my "identity" maliciously spoofed over the Internet
(resulting in uncomfortably close threats to my physical well being),
and also wishing to protect my privacy and the privacy of my
correspondents, I'm going to have to disagree with your somewhat
dismissive comments about the usefulness of PGP.
== I've never had that drastic an experience and don't
personally know anyone who has, but I can imagine how
disconcerting it must be. I hope it's over and that all is
on an even keel again? And, you're absolutely correct to
protect yourself and your correspondence.

I also feel that
your "hiding little oddities here and there" is in no way an adequate
substitute for what PGP or GnuPG can offer in terms of
authentication.
== No arguement, except that for our little group, it is
effective. In THIS environment, it's easy to do,
non-techie, easily recognized, and never repeats in any
pattern. Not hard to do given a little thought. Obviously
it can't compare to GP, but ... see my above para please for
my further opinions.

The method you describe is, at best, about as
"secure" or "reliable" as ROT13 is as an "encryption
scheme". :-)
== Oh, indisputably not even as "good" as rot13. But,
effective if/when implemented, for day to day "how ya doin'"
and "how's the family" type of emails or even "how do I"
stuff, which is the majority of personal communications. If
anyone wants to listen to our data, more power to them;
they'll get bored reading it in a hurry! Now, if we had to
send each other ss numbers, financial info, stuff like that,
well, that's a lot different. Email in this vein is in the
non-time critical, personal informationless chatter amongst
friends who all stick together for a common goal, Not a one
of us is afraid to pick up the telephone for a data-filled
conversation, also a not very reliably private method
though.
By firing up my other browser, I automatically get the
certificates and encryption (128 AES normally) to use with
clients and other knowledgeable people.
I like my method because no one gets surprised of
confused if I implement it right, and remember to ask the
right questions. It also helps sometimes in figuring out
the source of an address leak to spammers. eg you can go
right to an email address here in this group if you want to,
and it's a real one (not the nobody@ in display), but it's
also a spamtrap and never read, so you won't get a response
from it. And since one had to work to get that particular
address when it's obvious I don't wnt it used, I never feel
bad if an "innocent" person uses it and get LARTed; they
asked for it.
....
Verifying a digital signature *does* do one thing, and *can* do two
things...

1) It *does* determine whether or not *anything* has been altered in
the message/document/file between the moment it was signed and the
moment the signature was verified.
....
it is also very good,
because PGP simply doesn't tolerate *any* changes made to an
already signed message, document, or file.
== No arguement, but only needed in the rarest of
circumstances outside a data or client relationship.
2) It *can* also "authenticate" the *signer* of a
message/document/file (who *may* also be the "author" of the
signed message/document/file in question), but this aspect of
authentication depends on one's understanding of the "web of
trust" (which also depends on one's trust of another's careful
usage of the program...including the safeguarding of one's private
key and passphrase).
== Exactly, which removes if from the realm of newbies and
neophytes in most cases. From what the OP asked, this would
be overkill facts, IMO.
.... it.

I think the idea that "official" work is somehow more worthy of
authentication and privacy protection than "personal" work or
correspondence is misplaced.
== Gotta disagree here, but I think we're beginning to play
on syntax. See previous comments.

On the most simple level, would you
write a "personal letter" on a postcard and send it
through the post?
== Yes, I would.
Or would you *insist* on putting such correspondence in an
envelope?
== No, I wouldn't. But, we're playing syntax again. I
think you mean what I would consider intimate in nature, or
containing something not for public eyes. I couldn't care
less if they eyes want to read about my "Love, Pop" on my
postcards, and such. Now, if it has to do with say an ss #,
or maybe I graphically describe something illegal, yeah, I
would.
*Any* email that is not encrypted can be read by any number of
people; with copies being available at any number of servers it
passes through on its way from sender to recipient. In fact, an
"email postcard" holds the potential of being seen by many more
people than would ever be exposed to a paper postcard sent via "snail
mail".
== Not a problem. I don't care as long as there are no
illegal or personally usable info in it. What's so wrong
with that? Who cares if I wish my friends down in Texas
happy birthday and all that gunk. Paranoia is a valuable
asset to a degree, but it can be a detriment when it's
improperly placed in one's life. Everyone of course is
entitled to their own opinions, and line of reasoning, so
there isn't really a right or wrong answer here.
I wonder how many people here send "personal, private" email messages
to friends and family yet never even consider the *fact* that people
other than the intended recipient *can*, and more often than they
might think, *do* read their messages?
== Again, syntac, except "fact": this is exactly why
simpler introductory experiences and education are so
important. Pushing Aunt Nelly into spending money on a
certificate and fiddling with PGP isn't the best path. Aunt
Nelly often ends up ignoring it all and goign her own way.
Education is key.
Unless and until one is unpleasantly surprised by some incident
involving the "unauthorized" reading of their personal
correspondence, they may never know that others can and do read their
messages.
== Disagreed. This assumes that NO ONE can understand the
implications of privacy without the actual experience.
While it may be true in your case, and this isn't a cut at
you, it's NOT true in all cases. A simple degree of
education with a pinch of paranoia goes a long ways.

On the other hand, we *can*, by using encryption, be
comfortable in the knowledge that even if someone other than our
intended recipient were to look at a copy of our correspondence, they
wouldn't be able to read the contents.
== And, not have your mails read because they ARE
encrypted.
Since this is PGP signed, what value is that to me?
Yeah, it'll tell me you are pretty much the person who
signed the PGP letter, but what's the value of it? I don't
know you from Adam, and although your nick is Melissa, you
could just as easily be a 40 year old pedophilic, identity
stealing pervert. Public keys destroy the usefulness of it
all, and there's nothing stopping the pervert from posing as
you, with this signature. There is nothing in place to
insure that you are who you say you are.
Obviously, in SOME (very important) situations, PGP IS
functional and usefull! But, here, amongst us strangers,
what possible good is it? I often have to smile when I see
the PGP sigs on the newsgroups, and always wonder if they
are well known or sufficiently entrenced to make the added
bit of bandwidth worth it?

I think my scope in life is simply wider than yours and if
you feel that I called you paranoid, which I didn't mean to,
please realize that paranoia is nomal and useful in the
right proportions. And I hope your experiences are all
positive in the future.

Pop
 
Back
Top