Advertisement
Guest User

readme.thx

a guest
Sep 23rd, 2015
385
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 26.32 KB | None | 0 0
  1. PGP Startup Guide
  2.  
  3.  
  4. - -----BEGIN PGP SIGNED MESSAGE-----
  5.  
  6. Xenon (an48138@anon.penet.fi) has kindly posted an info sheet on getting
  7. MacPGP 2.3a up and running, encouraging somebody to come along and write the
  8. same thing for the PC version. Well, hell, here it is. Questions,
  9. comments, bitches, and e-mail about this kind of stuff in general are
  10. welcome at an50928@anon.penet.fi. Our public key to verify the document can
  11. be found at the end of this document, and also on keyservers all over the
  12. damn place.
  13.  
  14. ================================================================================
  15. PGP Startup Guide - DOS Version
  16.  
  17. v1.0
  18. (93/11/28)
  19.  
  20. Out and About
  21.  
  22. ================================================================================
  23.  
  24. Contents
  25. ========
  26. Section 1 - Intro
  27. <1.0> What the hell is this document?
  28. <1.1> What the hell is PGP?
  29.  
  30. Section 2 - Obtaining It
  31. <2.1> BBSs
  32. <2.2> America Online
  33. <2.3> CompuServe
  34. <2.4> InterNet
  35. <2.5> Setting it up
  36.  
  37. Section 3 - Using It
  38. <3.1> Generating a Key
  39. <3.2> Keys & keyrings
  40. <3.3> Keyservers
  41. <3.4> Signing
  42. <3.5> Encrypting
  43. <3.6> Other useful commands
  44.  
  45. Section 4 - Miscellaneous
  46. <4.1> Legal Issues
  47. <4.2> ViaCrypt
  48. <4.3> Version History
  49. <4.4> Everything Else
  50.  
  51. ================================================================================
  52.  
  53. Section 1 - Intro
  54. <1.0> What the hell is this document?
  55.  
  56. This document is an intro to PGP on MS-DOS machines. It's designed for a
  57. first-time user of PGP, and will get them through finding the program;
  58. getting the program; and, finally, using the program in a basic way. In
  59. other words, a good way to get more people using PGP.
  60.  
  61. <1.1> What the hell is PGP?
  62.  
  63. PGP is a cryptography system that allows you to send data to other people
  64. with what amounts to excellent security. The important point about PGP,
  65. though, is that you never have to meet the person you're sending encrypted
  66. information to. This might not make sense at first, but this capability is
  67. essential to the benefits PGP can provide.
  68.  
  69. Traditional encryption techniques have one key. The two people meet first,
  70. and exchange this key; then, afterwards, one encrypts the data with the key,
  71. sends it to the other person, who uses the same key to decrypt it. Simple,
  72. eh?
  73.  
  74. Well, PGP can do that, but it can also do something else, called public-key
  75. encryption. This means that you encrypt a document with somebody's "public
  76. key" - which is freely distributed - and *only they* will be able to decrypt
  77. it, with their corresponding private key. Nobody else can. Not even you,
  78. right after you've encrypted it with their public key.
  79.  
  80. Some people may wonder why PGP is necessary. Some people probably don't
  81. care. However, the two of us work remote in a distributed environment - our
  82. modems are our connection to the office, and anytime we're sending sensitive
  83. data through any kind of network, we're risking somebody else grabbing a
  84. copy. With PGP, that's no longer an issue.
  85.  
  86. Additionally, we're always sure that documents come from where they were
  87. supposed to, since it's impossible to forge the digital "signatures" that
  88. PGP creates. For example, nobody knows who the two of us really are - the
  89. anonymous server takes care of that. However, once you've got our public
  90. key, you'll know that anything verified by that key came from us - without
  91. ever meeting either of us. Thus, by coupling the anonymity of the InterNet
  92. and the authentication of PGP, we can be anonymous, yet readily - and
  93. reliably - identified. Cool, eh?
  94.  
  95. The only potential problems with public-key systems is verifying the public
  96. keys you have; see below, as well as the PGP documentation, for help on
  97. this.
  98.  
  99. Section 2 - Obtaining It
  100. <2.1> BBSs
  101.  
  102. PGP is probably available on some local BBSs in your area. If your local
  103. BBS lacks it, here's some info from the PGP docs:
  104.  
  105. ================================================================================
  106. The GRAPEVINE BBS in Little Rock Arkansas has set up a special
  107. account for people to download PGP for free. The SYSOP is Jim Wenzel,
  108. at jim.wenzel@grapevine.lrk.ar.us. The following phone numbers are
  109. applicable and should be dialed in the order presented (i.e., the
  110. first one is the highest speed line): (501) 753-6859, (501)
  111. 753-8121, (501) 791-0124. When asked to login use the following
  112. information:
  113.  
  114. name: PGP USER ('PGP' is 1st name, 'USER' is 2nd name)
  115. password: PGP
  116.  
  117. PGP is also widely available on Fidonet, a large informal network of
  118. PC-based bulletin board systems interconnected via modems. Check
  119. your local bulletin board systems. It is available on many foreign
  120. and domestic Fidonet BBS sites.
  121.  
  122. In New Zealand, try this (supposedly free) dial-up BBS system:
  123. Kappa Crucis: +64 9 817-3714, -3725, -3324, -8424, -3094, -3393
  124.  
  125. Source and binary distributions of PGP are available from the Canadian
  126. Broadcasting Corporation library, which is open to the public. It has
  127. branches in Toronto, Montreal, and Vancouver. Contact Max Allen, at
  128. +1 416 205-6017 if you have questions.
  129.  
  130. For information on PGP implementations on the Apple Macintosh,
  131. Commodore Amiga, or Atari ST, or any other questions about where to
  132. get PGP for any other platform, contact Hugh Miller at
  133. hmiller@lucpul.it.luc.edu.
  134. ================================================================================
  135.  
  136. <2.2> America Online
  137.  
  138. As of a few days ago, PGP is also available on America Online. If you have
  139. any specific information on where PGP is available on AOL, please send it to
  140. us; we'll include it in a future version of this document.
  141.  
  142. <2.3> CompuServe
  143.  
  144. Officially, it's not available on CompuServe, but try GO IBMFF and use the
  145. File Finder on the keyword PGP; usually some forum still has it sitting
  146. around, despite CIS's management trying their best to get rid of it.
  147.  
  148. <2.4> InterNet
  149.  
  150. If you're on the InterNet, the easiest way to dig up a copy of PGP is to ask
  151. an "archie" server for the location. Borrowing from Xenon's excellent
  152. directions, find yourself an InterNet account, and telnet over to
  153. archie.internic.net. Log in with a username of "archie", and at the prompt,
  154. type "prog pgp23a.zip". You'll get a list of sites and directories, a la:
  155.  
  156. ================================================================================
  157. Host soda.berkeley.edu (128.32.149.19)
  158. Last updated 09:50 4 Nov 1993
  159.  
  160. Location: /pub/cypherpunks/pgp
  161. FILE -rw-r--r-- 320168 bytes 08:09 3 Jul 1993 pgp23a.zip
  162.  
  163. Host isy.liu.se (130.236.1.3)
  164. Last updated 08:14 3 Nov 1993
  165.  
  166. Location: /pub/misc/pgp/2.3A
  167. FILE -rw-r--r-- 422851 bytes 10:58 19 Sep 1993 pgp23a.zip
  168. ================================================================================
  169.  
  170. Close archie by typing "bye", then ftp to one of the above sites. Use
  171. "anonymous" for the user name, and your e-mail address as a password. Type
  172. "cd
  173. ", where
  174. is the directory listed in the archie listing for
  175. the site you're ftping to. Type "binary", which sets the binary mode on.
  176. Then type "get ", where is the filename listed by
  177. archie. Finally, type "bye" to get back to your email system.
  178.  
  179. Get the file from your email system to your PC; this varies so much from
  180. site to site that you'll need somebody local to help.
  181.  
  182. <2.5> Setting it up
  183.  
  184. Once you've got it on your PC, unzip PGP into its own directory. You'll
  185. also need to set two environment variables for PGP to be happy. One, TZ,
  186. sets the time zone for the system; here are some examples from the PGP docs:
  187.  
  188. For Amsterdam: SET TZ=MET-1DST
  189. For Arizona: SET TZ=MST7 (Arizona never uses daylight savings time)
  190. For Aukland: SET TZ=NZT-13
  191. For Chicago: SET TZ=CST6CDT
  192. For Denver: SET TZ=MST7MDT
  193. For London: SET TZ=GMT0BST
  194. For Los Angeles: SET TZ=PST8PDT
  195. For Moscow: SET TZ=MSK-3MSD
  196. For New York: SET TZ=EST5EDT
  197.  
  198. Then set PGPPATH to the location you've unzipped PGP into; for example:
  199.  
  200. SET PGPPATH=C:\PGP
  201.  
  202. READ THE DOCS! What follows from here is a good way to get started, but
  203. there are a number of issues raised in the documentation that *must* be
  204. known for safe and reliable operation!
  205.  
  206. Section 3 - Using It
  207. <3.1> Generating a Key
  208.  
  209. PGP works on the principle of "public-key" encryption. This means that
  210. every key has two parts: a secret part you keep close to your heart, and a
  211. public part you scatter to the winds. The two have some mysterious,
  212. mathematical relationship that Einstein couldn't understand, but for our
  213. purposes all that matters is that the public part can decrypt things
  214. encrypted by the secret part, and vice versa. Thus, the first step in using
  215. PGP is to generate your key. Type:
  216.  
  217. PGP -kg
  218.  
  219. Select a key length; the bigger, the more secure. Most people use 1024
  220. bits, and it isn't that much slower. Following this, PGP will ask you for
  221. your user name. For example:
  222.  
  223. Out and About
  224. |-----+-----| |----------+----------|
  225. | |
  226. | +----------+ Email Address, in <> brackets
  227. +-----------------------------+ User Name, plain text
  228.  
  229. Please follow this pattern; since a lot of people are starting to use their
  230. PGP keyrings with their friend's PGP keys as their email directories,
  231. keeping things relatively constant is a Good Thing.
  232.  
  233. It'll then ask you for a "pass phrase." This pass phrase is *very*
  234. important. What PGP does, to insure that your secret key is used only when
  235. authorized, is encrypt the secret key data with this "pass phrase," so that
  236. only if the pass phrase is known will the secret key work. As with most
  237. kinds of password, this should not be something easily guess. Differing
  238. from most passwords, though, is that this phrase can pretty much be any text
  239. you want, with long lengths encouraged. Use random characters interspersed
  240. with text, like hey1me$for*turkeys^clinton. Don't use famous quotations, or
  241. anything easily guessed, since this pass phrase is what keeps your secret
  242. key secure.
  243.  
  244. The program will then want some number of random keystrokes. This probably
  245. sounds silly, but it's actually very important. Computers can generate
  246. pseudorandom numbers, but truly random numbers are impossible - computers
  247. are fancy calculators, and randomness comes hard. So, PGP wants some
  248. keystrokes - which it times - to derive some truly random numbers for
  249. generating the keys.
  250.  
  251. Then it generates the key. Go have lunch while this is happening; it's
  252. probably the most boring interface yet come up with by any programmer,
  253. unless you enjoy periods and plus signs. A lot. Especially if you have a
  254. slow machine.
  255.  
  256. Finally, PGP will beep, and you've got a public and a secret key, stored on,
  257. logically enough, a public and a secret keyring. Which, of course, brings
  258. us to keyrings.
  259.  
  260. BUT WAIT!! Before you touch the next section, execute the following
  261. command:
  262.  
  263. PGP -ks
  264.  
  265. Where is some part of your user ID that you typed in above. You'll
  266. have to type in that damn pass phrase - you did remember it, didn't you? -
  267. and PGP will sign your key with your key. While this probably sounds
  268. redundant, it actually plays a very important part in assuring that your key
  269. remains unmolested. Nothing worse than molested keys ...
  270.  
  271. <3.2> Keys & keyrings
  272.  
  273. We mentioned keyrings above. Well, if you've got keys in real life,
  274. keyrings are a good place to put them. PGP keys aren't any different.
  275.  
  276. PGP, by default, has two keyrings: public and secret. Since you've already
  277. generated a key pair, you've got one public and one secret key - the two
  278. matching parts of your key. These are stored on two keyrings; logically,
  279. there's a public one (stored in PUBRING.PGP), and a secret one (stored in
  280. SECRING.PGP). The public keyring also will eventually contain keys for your
  281. friends and such; the material on it is desiged for public distribution. The
  282. SECRING.PGP file, on the other hand, is *very* valuable. With that file and
  283. your pass phrase, anybody can sign documents with your "electronic"
  284. signature, and decrypt things sent to you. Don't let it out of your sight;
  285. while your pass phrase does protect the contents of the secret ring to a
  286. certain extent, keeping the file secure is just as important as keeping the
  287. pass phrase secret.
  288.  
  289. Since public keys can be distributed freely, they can be obtained from
  290. keyservers (see below), among many other places. The PGP distribution
  291. includes one called KEYS.ASC, which includes the public keys of the authors
  292. of PGP. As a first exercise, let's add it to your public keyring with this
  293. command:
  294.  
  295. PGP -ka KEYS.ASC
  296.  
  297. PGP will ask if you want to certify any of the keys you've just added. Say
  298. "no"; certification means you know for sure that the key belongs to a user.
  299. If you later get keys from friends who hand them to you personally, you can
  300. say "yes" when you add their keys, telling PGP you know the keys really
  301. belong to who they claim to.
  302.  
  303. To view the contents of your public keyring, use this:
  304.  
  305. PGP -kv
  306.  
  307. And wham! A list appears, one line for each key on your ring. You'll
  308. notice your key down at the bottom, along with a list of the authors. Each
  309. line starting with "pub" represents one distinct key; note that keys can
  310. have more than one name or email address attached to them.
  311.  
  312. The anonymous key for the two of us can be found at the bottom of this
  313. document. You'll need it on your public keyring in order to verify this
  314. document in a later section. Save the chunk of text to a file, then tell
  315. PGP to add it with a similar command to what we used to add the authors'
  316. keys:
  317.  
  318. PGP -ka
  319.  
  320. Of course, you're not always going to be adding keys; you'll need to extract
  321. yours, as well as other people's when you sign them. To extract any public
  322. key from your keyring in the above format, use the command:
  323.  
  324. PGP -kxa
  325.  
  326. Where is some unique part of their name or email address. For example,
  327. to create a copy of your public key to pass around to your friends, type:
  328.  
  329. PGP -kxa MYKEY.ASC
  330.  
  331. Where is some part of the name or email address you used when creating
  332. the key. The file MYKEY.ASC - which will look very similar to our key above
  333. - can be easily put in email messages, text editors, posted on bulletin
  334. boards, everything. Distribute it far and wide; this will help prevent
  335. other people from trying to distribute fake public keys in your name.
  336.  
  337. <3.3> Keyservers
  338.  
  339. Keyservers are a muy bueno invention to spread public keys faster than the
  340. SR-71 used to fly. Basically, keyservers are a group of computers that
  341. maintain a massive (800+K, last I checked) public keyring with thousands of
  342. keys on it. You can query this server to get a specific person's public
  343. key, either to send something to them, or to verify one they've already sent
  344. to you. Here's some info, which shows regularly in alt.security.pgp. Check
  345. there for the latest info:
  346.  
  347. ================================================================================
  348. Each keyserver processes requests in the form of mail messages. The
  349. commands for the server are entered on the Subject: line.
  350.  
  351. To: pgp-public-keys@pgp.iastate.edu
  352. From: johndoe@some.site.edu
  353. Subject: help
  354.  
  355. Sending your key to ONE server is enough. After it processes your
  356. key, it will forward your add request to other servers automagically.
  357.  
  358. For example, to add your key to the keyserver, or to update your key if it is
  359. already there, send a message similar to the following to any server:
  360.  
  361. To: pgp-public-keys@pgp.iastate.edu
  362. From: johndoe@some.site.edu
  363. Subject: add
  364.  
  365. -----BEGIN PGP PUBLIC KEY BLOCK-----
  366. Version: 2.2
  367.  
  368.  
  369. -----END PGP PUBLIC KEY BLOCK-----
  370.  
  371. COMPROMISED KEYS: Create a Key Revocation Certificate (read the PGP
  372. docs on how to do that) and mail your key to the server once again,
  373. with the ADD command.
  374.  
  375. Valid commands are:
  376.  
  377. Command Message body contains
  378. - - ---------------------- -------------------------------------------------
  379. ADD Your PGP public key (key to add is body of msg)
  380. INDEX List all PGP keys the server knows about (-kv)
  381. VERBOSE INDEX List all PGP keys, verbose format (-kvv)
  382. GET Get the whole public key ring (split)
  383. GET userid Get just that one key
  384. MGET regexp Get all keys which match /regexp/
  385. LAST days Get the keys updated in the last `days' days
  386. - - ------------------------------------------------------------------------
  387. Internet connected sites:
  388. pgp-public-keys@pgp.mit.edu
  389. Derek Atkins
  390. warlord@MIT.EDU
  391. FTP: pgp.mit.edu:/pub/keys/public-keys.pgp
  392. pgp-public-keys@phil.utmb.edu
  393. John Perry
  394. perry@phil.utmb.edu
  395. FTP: phil.utmb.edu:/pub/pgp/public-keys.pgp
  396. pgp-public-keys@demon.co.uk
  397. Mark Turner
  398. mark@demon.co.uk
  399. FTP: ftp.demon.co.uk:/pub/pgp/pubring.pgp
  400. ================================================================================
  401.  
  402. <3.4> Signing
  403.  
  404. By signing a key, you're stating to the world that you know that the key in
  405. fact does belong to the name shown. The benefit of this is that, if you
  406. know the "introducer" - the person who's signed a public key you're going to
  407. use - can be trusted with handling keys, then you don't necessarily have to
  408. verify the key itself. While this can easily descend into a complex tangle
  409. of what exactly qualifies as "signing," for the purposes of this
  410. introduction, you sign a key like this:
  411.  
  412. PGP -ks
  413.  
  414. You'll be prompted for your pass phrase - we honestly hope you've remembered
  415. that thing damn well by now - and PGP will "sign" the key for you. Then,
  416. extract that person's public key - which will now include your signature -
  417. and send it to them. They can add it to their public keyring, and they'll
  418. suddenly gain the benefit of your signature. This means that if they're
  419. communicating with somebody who doesn't know them, but knows you, the third
  420. person can use your signature to verify the key's validity.
  421.  
  422. If somebody else signs your key and sends it back to you, use the PGP -ka
  423. command (mentioned above) to add the amended key back onto your public
  424. keyring. PGP will recognize that just a signature has been added, and will
  425. append that to your keyring, meaning that the next time you extract your
  426. public key, that signature will go along with it.
  427.  
  428. To see signatures on your keyring, use a modified version of the view
  429. command we used before:
  430.  
  431. PGP -kvv
  432.  
  433. <3.5> Encrypting
  434.  
  435. Heh. And you thought all we were ever going to talk about was keys and
  436. crap, right? You'll be happy to know that PGP is pretty good at its primary
  437. mission in life - encryption. The most simple form is this:
  438.  
  439. PGP -e
  440.  
  441. Where is the file to encrypt, and is the target user who's
  442. going to decode it. This'll create another file called .pgp, which is
  443. the encrypted text. Send it off, and the other user will be able to decode
  444. it. When you receive an encrypted file back, simply type:
  445.  
  446. PGP
  447.  
  448. And PGP will figure out that it needs to decrypt the file, and do so.
  449.  
  450. Now, you think you're set, because you've encrypted a file, right? Well,
  451. there's only one flaw in this grand strategy: while only one person in the
  452. world can decrypt that file, that person won't have any assurance of where
  453. the file came from. That's where digital signatures come into the picture.
  454.  
  455. A digital signature irrevocably identifies whatever you're sending as having
  456. come from you. A very nice thing to have. Best of all, it's easy as sin to
  457. do. Just add one character to the command line you used above:
  458.  
  459. PGP -es
  460.  
  461. You'll be prompted for your pass phrase (getting good at typing that in
  462. yet?), and then PGP will first sign the document with your secret key -
  463. allowing it to be verified with your public key on the other end - and then
  464. encrypting it with the other person's public key, so only their secret key
  465. can decrypt it.
  466.  
  467. You can also just sign a document; this allows the document's source to be
  468. verified, without any sort of encryption. A good example is what you're
  469. reading right now. Save it to a file, and type:
  470.  
  471. PGP
  472.  
  473. Where, of course, is the name of the file you saved this document to.
  474. It'll work for a few seconds, then say (hopefully) it's got a good signature
  475. from us. It'll then produce a non-signed version, which contains the
  476. original message text; if the signature was good, that text is the same as
  477. what we originally put out, and you know it came from us.
  478.  
  479. <3.6> Other useful commands
  480.  
  481. There are two other commands you should probably know.
  482.  
  483. First, there's the Radix-64 switch, which tells PGP to produce files which
  484. can be emailed, UUEncoded-style, through mail networks. To do this, you
  485. just add an "a" to whatever you're sending, a la:
  486.  
  487. BEFORE: PGP -es example.txt Mary
  488. AFTER: PGP -esa example.txt Mary
  489.  
  490. The output will be sent to example.asc; furthermore, it'll be convienently
  491. split into chunks the mailers can handle, it the file is long enough. We
  492. used this switch already, above, for extracting keys, since the ASCII
  493. format, for something the size of keys, is far more versatile than a binary
  494. representation.
  495.  
  496. Second, there's clearsigning; this means you add your signature, but leave
  497. the document readable, which was what we did for this document. To do this:
  498.  
  499. PGP -sta +clearsig
  500.  
  501. Which will produce a file called .asc, containing the document, with a
  502. signature at the end.
  503.  
  504. Section 4 - Miscellaneous
  505. <4.1> Legal Issues
  506.  
  507. Oh yeah - PGP is illegal, at least if you live in the US and Canada. Why?
  508.  
  509. PGP makes use of the RSA public-key algorithm, developed at MIT with tax
  510. dollars. The US Government then allowed a company out in California to
  511. patent this algorithm; thus, if you're using this product in the US or
  512. Canada, you're likely violating that patent. See the next section on how to
  513. get around this. Also, if you know anything about the situation, please
  514. send us email on how we can get the goverment to use tax dollars to develop
  515. technology, then hand exclusive implementation rights to us. This would be
  516. a most excellent thing to have happen.
  517.  
  518. If you're out of the US or Canada, using PGP is not a problem, since the
  519. patent laws don't apply; just *don't ask a friend in the US or Canada to
  520. send you a copy*. Thanks to the US Government's enlightened export
  521. restrictions, PGP is considered to be munitions, meaning that you could get
  522. sacked with serious shit if you either import or export it to/from the US
  523. and/or Canada, including posting over the InterNet, or any other
  524. international information service. That's why Phil Zimmerman's being
  525. investigated by the San Jose customs office right now. Yep, our tax dollars
  526. hard at work.
  527.  
  528. <4.2> ViaCrypt
  529.  
  530. However, all is not lost for US users. A company called ViaCrypt in Arizona
  531. is selling a properly licensed version of PGP which, for all practical
  532. purposes, is completely compatible with v2.3a. Here's a small blurb:
  533.  
  534. ================================================================================
  535. ViaCrypt, Inc., will begin shipping ViaCrypt PGP today, 1 November 1993.
  536. ViaCrypt PGP is a commercial public-key encryption package which is
  537. based on, and virtually identical with, the freeware program known as
  538. PGP, or `Pretty Good Privacy.' (The source code is in fact identical to
  539. that of the freeware version 2.3a of PGP, with the exception of the RSA
  540. encryption module, which is one ViaCrypt developed in-house after
  541. acquiring a license for the algorithm from PKPartners. In addition,
  542. ViaCrypt incorporates a few bug fixes. The private-key crypto algorithm
  543. is IDEA, as in freeware PGP, for which ViaCrypt has obtained a license
  544. from Ascom-Tech AG of Zurich.)
  545. ================================================================================
  546.  
  547. Contact info:
  548.  
  549. ViaCrypt
  550. 2104 W. Peoria Ave.
  551. Phoenix, AZ 85029 USA
  552. 602-944-0773 (Voice)
  553. 602-943-2601 (FAX)
  554. 70304.41@compuserve.com (Netmail)
  555.  
  556. <4.3> Version History
  557.  
  558. 93/11/28 v1.0 Initial Version
  559.  
  560. <4.4> Everything Else
  561.  
  562. Please let us know if you find any problems with this document or have any
  563. questions about it; we can be reached at an50928@anon.penet.fi as long as
  564. that anonymous server remains up. Let's hope it does, because otherwise
  565. you'll have one damn hell of a time finding us. If this document helps you,
  566. by all means pass it on to every person you know, and maybe a few you don't.
  567. Post it on lots of BBSs, all over the place, ad naseum. Tell everybody you
  568. know to start using PGP, because the more people use PGP, the less we all
  569. have to worry about a President Orwell.
  570.  
  571. ================================================================================
  572.  
  573. Contents Copyright (C) 1993 by Out and About. Assuming you could figure out
  574. who and where we are, that might mean something, but hey ...
  575.  
  576. - -----BEGIN PGP SIGNATURE-----
  577. Version: 2.3a
  578.  
  579. iQCVAgUBLPgwgXv2tR+FRQuZAQFBvgP/c5VY0QBkZhOZhFGH1lfpCpfc/tT6FrNw
  580. dae81c049wNj4jORq1eodm2pn8ObgrmK6qb5CQS2CST27fBD1wtnGvyyisvfYtqa
  581. yaYs2qBBEwkURZI7M6kjCdL1snaQ14ScfYLQiBH0jqle+uORsHeke429NG0fr6oa
  582. zVlyOqFvMQs=
  583. =Hl80
  584. - -----END PGP SIGNATURE-----
  585.  
  586. Here's our key:
  587.  
  588. - -----BEGIN PGP PUBLIC KEY BLOCK-----
  589. Version: 2.3a
  590.  
  591. mQCNAiztdHkAAAEEAL3VO4LItnVBwLGZi6Hux2MoWkpqDE4gZtSGu2NAgE6zaT+6
  592. B8NibIwCPxL+8qfeS36BqvZ3GbSOI0SJldUc9sXZeNHsB7RnLgUTmA9mLoaDeL7k
  593. IHXKpk2uc1CuzLawaY9WDflnntumfhD7p7JReoI7/PZPSzR813v2tR+FRQuZAAUR
  594. tCVPdXQgYW5kIEFib3V0IDxhbjUwOTI4QGFub24ucGVuZXQuZmk+iQCVAgUQLO12
  595. SXv2tR+FRQuZAQELzgP9FADqM3zy7P8BxPFK7oIxlf8+e1TtYmM1aA+1zHeu0kp9
  596. Sxk5IgydAZmBCVihu78V+oaG+7+gTwqCc3MHJoEpmsrK+E6hsZYW1EWW4tUDisRe
  597. uSICYLOdqaWOGzIdBXJX3NZEYyA4bv7dHd+VEESNQrDbQDqHD7+tLVwQtqZEQ5o=
  598. =QQEg
  599. - -----END PGP PUBLIC KEY BLOCK-----
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement