Anonymous (nobody@replay.com)
Mon, 18 Jan 1999 15:14:23 +0100
Oh joy of joys. We have another snake oil peddler. The company is
called Ciphile. http://www.ciphile.com/
This guy might actually be on to something if it wasn't for that whole
open source, peer review, laws of the universe thing.
Anthony, who apparently claims credit for this "technology" (patent
pending), recently posted this to alt.privacy:
Anthony Stephen Szopa <anthony@ciphile.com> wrote, in part:
>If your computer is connected through a modem to an outside phone
line
>and is left turned on, even if the modem is turned off, I believe it
is
>certainly possible for someone to connect to your phone without
causing
>your phone to ring and to turn on your modem then read your hard
drive
>while disabling your hard drive access LED.
>Can anyone tell me why this cannot happen?
The below is also on the web site. I'll leave everyone to their own
conclusions, except to say that he doesn't get much support from me,
especially considering the guy doesn't even know how to use ALT tags
on his inline images on his web pages.
A Personal Tongue-In-Cheek Message from Anthony:
I'll be honest with you, I don't understand how secure PGP/RSA
is. Do you truly understand the odds of breaking a PGP/RSA encrypted
message? Do you
think all those who hype PGP/RSA understand? If you use it or
decide to use it you may simply be taking it on faith. Why not forget
all about it and
practice prayer?
My understanding is that PGP/RSA is a mathematical formula based
algorithm. Might there be a mathematical procedure that makes the
breaking of PGP/RSA
a trivial matter. I've seen awesome transformations in calculus
that readily solve apparently unsolvable problems.
If you were the CIA, wouldn't you search for and or fund the
developement of a seemingly unbreakable encryption algorithm then have
all your lackeys
promote it around the world as being the ultimate in encryption,
knowing that it is so esoteric that most of the best of the best
probably haven't got
a prayer in even conceiving of a possible approach to a solution.
Wouldn't it be exactly what the CIA would want if such an
encryption algorithm became the "de facto" standard around the world?
All the while, deep
down in the cellars of CIA headquarters, there is a little old
mathematician who has figured it all out but isn't telling anyone!
And how can you trust what all these "experts" claim when they
probably haven't got the foggiest where their next research grant is
coming from or
even if there is going to be another grant for them if they're not
careful? Don't get me wrong. I don't dislike the CIA or
Academicians. I just like
to think in terms of Realpolitik.
But I simply have a serious problem with all encryption
mathematical equation algorithms.
OAP-L3: Original Absolute Privacy - Level3 ) (patent pending)
Version 3.0 is based on a non-mathematical random process. There can
be no mathematical
approach to breaking this code! Here is encryption software that
you can prove to yourself to be practicably unbreakable when you set
up the
encryption data and parameter files properly.
Best Regards,
Anthony
[qs_homen.gif] [qs_mailn.gif]
[qs_mtbr.gif]
Web Author: Anthony
Copyright )1998 by Ciphile Software - ALL RIGHTS RESERVED
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:18:04