Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    PUBLIC_KEYS    |    Public-Key Discussion Echo    |    845 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 798 of 845    |
|    August Abolins to Wilfred van Velzen    |
|    Cops hate encryption but the NSA loves i    |
|    04 Jun 23 11:08:00    |
      MSGID: 2:221/1.58@fidonet 091d60af       REPLY: 2:280/464 647c6538       PID: OpenXP/5.0.57 (Win32)       CHRS: ASCII 1       TZUTC: -0400        AA>> Hmmm.. Too bad networked (via FTN) BBSes don't stress that        AA>> opaqueness as pretty-good-isolation from internet collection        AA>> then.               WvV> Probably everything is collected. And btw binkd doesn't use a very good        WvV> encryption algorithm. So if they wanted/needed to break it, they        WvV> probably could.              I thought binkd's encryption only extended to the        authentication part. If the whole transfer, ie. the PKTs are        encrypted, that's interesting.              According to this, http://mimac.bizzi.org/        fidonet_programmi_binkd.html              "traffic encryption" was added.                      WvV> So the hiding gpg traffic only works as long as we        WvV> remain small and under the radar...              Oh.. so you mean to include gpg'd netmail messages in the        transfer?                      AA>> Well.. I thought that if it becomes known that BBSes are        AA>> the transport mechanism for secret/suspect messages, then        AA>> the spys could investigate the BBS and owners and choose        AA>> to knock on their doors some day?               WvV> Of course, but that is true for any kind of        WvV> communication... The point is not to become suspect! ;-)              Yes n No. I suppose that "authorities" could demand unlocking        encrypted messages on "grounds" for suspicion. That happend at        Prontomail not long ago. What those "grounds" could be could        be debatable and suspect itself. :D              I recall a movement that suggested that people simply FLOOD the        channels with messages that bore "suspect" text in the Subject        lines: super secret, terrorism, murder.. etc. The idea being        that then they will have too much data to analyse.              Similarly, random suspect words could be also be thrown in as        part of the message body at random times.              I dunno.. at this point I think the NSA wants people to think        that they have the ability analyse all the traffic out there -        and the media is more than willing to communicate that on their        behalf - but I think the reality is that analysing it ALL        within a reasonable time frame is not happening.              --         ../|ug              --- OpenXP 5.0.57        * Origin: What do you call an excavated pyramid? Unencrypted. (2:221/1.58)       SEEN-BY: 1/19 123 15/0 16/0 19/10 37 90/1 105/81 106/201 123/130 131       SEEN-BY: 142/104 153/7715 203/0 218/700 221/1 6 360 226/30 227/114       SEEN-BY: 229/110 112 113 206 307 317 400 426 428 470 664 700 240/5832       SEEN-BY: 266/512 280/464 5003 282/1038 291/111 292/854 301/1 317/3       SEEN-BY: 320/119 219 319 2119 322/0 757 326/101 342/200 396/45 423/81       SEEN-BY: 460/58 712/848       PATH: 221/1 320/219 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca