Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Mar 2000 21:46:09 -0800
From:      Doug Barton <Doug@gorean.org>
To:        goodleaf <john@home.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Off Topic AND Newbie-ish! Security...
Message-ID:  <38D1C6A1.D22C8E2@gorean.org>
References:  <Pine.BSF.4.21.0003161410210.20064-100000@C702312-A.sttln1.wa.home.com>

next in thread | previous in thread | raw e-mail | index | archive | help
goodleaf wrote:
> 
> Apologies for off-topic post. <sycophant>But the people on this list have
> the highest average competence I know of--mailing list wise.</sycophant>

	Yeah yeah... just make sure the check doesn't bounce. :)

> How secure is a pkzipped file that has been zipped with a password?

	The way you measure "security" is by weighing the cost of breaking the
security vs. the cost of the data. PKzip passes are crackable, all it
takes is a brute force attack. The question is how much computing time
will it take to crack it, and how much will that time cost your enemies? 

> My
> company is considering exchanging data, possibly sensitive, with another
> company who wants to "encrypt" by pkzipping to a password. 

	There is no substitute for PGP. There are even windows versions
available, so your client has no excuses. Do your research, pick a PGP
implementation that will work for you and go with it. If the data falls
into the wrong hands, it's your ass in the wringer, so don't take any
chances. 

Good luck,

Doug
-- 
"While the future's there for anyone to change, still you know it seems, 
 it would be easier sometimes to change the past"

     - Jackson Browne, "Fountain of Sorrow"


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?38D1C6A1.D22C8E2>