Re: snake oil

New Message Reply About this list Date view Thread view Subject view Author view

Eric Murray (ericm@lne.com)
Mon, 22 Jun 1998 15:32:13 -0700 (PDT)


Mordechai Ovits writes:
>
> All this talk about snake oil reminds me of my all time favorite crypto
> program:
> Text Encrypt
> I saw this program on www.winfiles.com
> (http://www.winfiles.com/apps/98/encrypt-file.html)
> It came with the ever reassuring statement:
> "Have you ever wanted to keep information secure or send an Email without
> the chance of someone else reading your message? Text Encrypt allows you to
> select a text file and encrypt/descramble it. Now you can keep stuff at
> home or around the office safe. If you need to send an Email, simply attach
> the encypted (sic) file to your message and all the receiving party has to
> do is to use the software - the encryption codes are encoded into the new
> file, so you don't even have to send them passwords."
> What an amazing feature! Talk about usability! :-)

Not only is it useable, it's patented:

File encryption method (Assignee -- Veritas Technology Solutions Ltd.)
 
May 28, 1998
 
Inventor(s): Kafri, Oded
Patent Number: 5751814
Issue Date: 1998 05 12
 
 
Abstract: A file encryption method is provided which includes the
steps of encrypting the text of the message to be sent,
concatenating the encrypted text together with a password to the end
of a decryption application to produce a combined file and
converting the combined file to an electronic mail format. The file
encryption method further includes the steps of transmitting and
receiving the converted combined file, reconverting the converted
combined file to its previous format and executing the combined file
thereby to operate the decryption application on the encrypted text
and thereby to produce the text of the message.
 
Ex Claim Text: A method for transmitting and receiving encrypted
messages, the method comprising the steps of: a. encrypting the text
of the message to be sent; b. concatenating the encrypted text and a
password to the end of a decryption application to produce a
combined file; c. converting the combined file to an electronic mail
format; d. transmitting and receiving the converted combined file;
e. reconverting the converted combined file to its previous format;
and f. executing the combined file thereby to operate the decryption
application on the encrypted text and thereby to produce the text of
the message.

-- 
Eric Murray  Chief Security Scientist  N*Able Technologies  www.nabletech.com
(email:  ericm  at  lne.com   or   nabletech.com)          PGP keyid:E03F65E5


New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:18:52 ADT