This is the mail archive of the
cygwin-talk
mailing list for the cygwin project.
RE: Password Protecting files
On Mon, 20 Aug 2007, Dave Korn wrote:
> On 20 August 2007 17:25, Igor Peshansky wrote:
>
> > On Mon, 20 Aug 2007, Dave Korn wrote:
> >
> >> On 20 August 2007 17:09, Igor Peshansky wrote:
> >>
> >>> On Mon, 20 Aug 2007, Dave Korn wrote:
> >>>
> >>>> On 20 August 2007 16:38, Igor Peshansky wrote:
> >>>>
> >>>>> On Sun, 19 Aug 2007, zzapper wrote:
> >>>>>
> >>>>>> zzapper <david@XXXX.XX.XX> wrote in
> >>>>>> Xns99917147CB10Czzappergmailcom@80.91.229.5:">news:Xns99917147CB10Czzappergmailcom@80.91.229.5:
> >>>>>>
> >>>>>>> use gpg
> >>>>>>
> >>>>>> Hey that was not very painful at all
> >>>>>>
> >>>>>> download gnupg from cygwin setup
> >>>>>> start with
> >>>>>>> gpg --gen-key
> >>>>>>
> >>>>>> then encrypt
> >>>>>>
> >>>>>>> gpg -e test.txt
> >>>>>>
> >>>>>> then decrypt
> >>>>>>> gpg -d test.txt.gpg > out.txt
> >>>>>
> >>>>> Of course, for a thoroughly secure way of protecting your data you
> >>>>> could run it through a hippo (i.e., let the hippo chomp down on
> >>>>> your data, and use the output). This is so secure that nobody
> >>>>> will ever be able to make heads or tails of your data again. Be
> >>>>> aware, however, that the cipher is completely asymmetric -- even
> >>>>> knowing the passphrase you used to convince the hippo to chomp
> >>>>> down on your data will not allow the adversary to decrypt the
> >>>>> result. Igor
> >>>>
> >>>> But they *will* be able to /shovel/ it.
> >>>
> >>> Sure, but transmission has never been a problem... ;-)
> >>> Igor
> >>
> >> Never underestimate the bandwidth of a bucket full of hippo-dung
> >> being flung across a river!
> >
> > Well, I suppose flooding the router *could* be a problem of sorts...
> > Igor
>
> No, sorry, slight typo there. What I mean is, never underestimate
> *how far back to stand from* ....
That depends entirely on the gesture. There are issues of coverage,
recoil, etc. I'm sure some network theorist properly itches for applying
his hypotheses and theorems to this case...
A full-scale physics simulation of the phenomenon would probably be
cleaner, though...
Igor
--
http://cs.nyu.edu/~pechtcha/
|\ _,,,---,,_ pechtcha@cs.nyu.edu | igor@watson.ibm.com
ZZZzz /,`.-'`' -. ;-;;,_ Igor Peshansky, Ph.D. (name changed!)
|,4- ) )-,_. ,\ ( `'-' old name: Igor Pechtchanski
'---''(_/--' `-'\_) fL a.k.a JaguaR-R-R-r-r-r-.-.-. Meow!
Belief can be manipulated. Only knowledge is dangerous. -- Frank Herbert