Password Protecting files

Igor Peshansky pechtcha@cs.nyu.edu
Mon Aug 20 16:19:00 GMT 2007


On Mon, 20 Aug 2007, Dave Korn wrote:

> On 20 August 2007 16:38, Igor Peshansky wrote:
>
> > On Sun, 19 Aug 2007, zzapper wrote:
> >
> >> zzapper <david@XXXX.XX.XX> wrote in
> >> news:Xns99917147CB10Czzappergmailcom@80.91.229.5:
> >>
> >>> use gpg
> >>
> >> Hey that was not very painful at all
> >>
> >> download gnupg from cygwin setup
> >> start with
> >>> gpg --gen-key
> >>
> >> then encrypt
> >>
> >>> gpg -e test.txt
> >>
> >> then decrypt
> >>> gpg -d test.txt.gpg > out.txt
> >
> > Of course, for a thoroughly secure way of protecting your data you could
> > run it through a hippo (i.e., let the hippo chomp down on your data, and
> > use the output).  This is so secure that nobody will ever be able to make
> > heads or tails of your data again.  Be aware, however, that the cipher is
> > completely asymmetric -- even knowing the passphrase you used to convince
> > the hippo to chomp down on your data will not allow the adversary to
> > decrypt the result.
> > 	Igor
>
>   But they *will* be able to /shovel/ it.

Sure, but transmission has never been a problem... ;-)
	Igor
-- 
				http://cs.nyu.edu/~pechtcha/
      |\      _,,,---,,_	    pechtcha@cs.nyu.edu | igor@watson.ibm.com
ZZZzz /,`.-'`'    -.  ;-;;,_		Igor Peshansky, Ph.D. (name changed!)
     |,4-  ) )-,_. ,\ (  `'-'		old name: Igor Pechtchanski
    '---''(_/--'  `-'\_) fL	a.k.a JaguaR-R-R-r-r-r-.-.-.  Meow!

Belief can be manipulated.  Only knowledge is dangerous.  -- Frank Herbert



More information about the Cygwin-talk mailing list