• Decoding this...

    From Avon@21:1/179 to Pequito on Thu Jan 12 22:10:00 2017
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    * Origin: Cryptogenic Radix (21:1/179)
  • From Pequito@21:1/126 to Avon on Thu Jan 12 02:39:00 2017
    On 01/12/17, Avon said the following...

    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    "Clipboard" contained no valid encrypted data.
    When attempted to decrypt.

    +- $s.s$s.s$ ----------------------------------------+
    | $²"$$$"²$ twinklebbs.homeip.net |
    | .$$$. winkle BBS twinklebbs.homeip.net:8080 |
    +-- .$$$$$. -----------------------------------------+
    $²"~"²$ Christopher Malo aka Pequito!

    --- Mystic BBS v1.12 A31 (Linux)
    * Origin: Twinkle BBS | (21:1/126)
  • From Vk3jed@3:633/410 to Avon on Thu Jan 12 23:33:00 2017
    Avon wrote to Pequito <=-

    @MSGID: <587748BA.72.fsx_cry@freeway.apana.org.au>
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    * Origin: Cryptogenic Radix (21:1/179)


    I haven't been able to decrypt today's crop of messages. Anyone need my key?


    ... I'm being held prisoner in a chocolate factory. Don't send help.
    --- MultiMail/Win32 v0.49
    * Origin: Freeway BBS - freeway.apana.org.au (3:633/410)
  • From Pequito@21:1/126 to Vk3jed on Thu Jan 12 06:38:00 2017
    On 01/12/17, Vk3jed said the following...

    Avon wrote to Pequito <=-

    @MSGID: <587748BA.72.fsx_cry@freeway.apana.org.au>
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    * Origin: Cryptogenic Radix (21:1/179)


    I haven't been able to decrypt today's crop of messages. Anyone need my key?

    Yes please, and here is my key again.

    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v2

    mQENBFe77XwBCADH/LB8+c6W+bvozAEwodd42qTJwyy689NFZ9RM+eI2yo5q9WXu wpyU2+0KibQZMw5IztxXTDB8rBcx5emtZpywt9M8NAaXPPKn9+Ela1+CsJAhYIMg 9wLcGHHTV6HfttUQtvGUrpgGObM7qTtSntXLtfZK4caD+R0fkjRrBw+m5/sjALud 9a8h2QtXm/5j0xLjWIQV32VHvUfk5TaEhEqrsjI1K2XJf+snP4N1V8/Z902j2MQ9 K4LxXKLA6JaVSMJK8R/CiP4tFaOSm+v2o+Ln7w6/Qa353DF7Br4GAO+VRk1DhIFI u4eJW97//dfMywnNgKZCe/Efioysg+nyfDt9ABEBAAG0I0NocmlzdG9waGVyIE1h bG8gPGNfbWFsb0B5bWFpbC5jb20+iQE5BBMBCAAjBQJXu+18AhsDBwsJCAcDAgEG FQgCCQoLBBYCAwECHgECF4AACgkQ9e/iooAtAcA3MAf+LUKglNSRl7t+MUEhqB3M uHVuKUyKCcXdQf9pOEjJpYP0vfFIMqcBsq+GZsQhO03NYrVXvGMIMCCq1/0MQ6Wx wHzZzuJQiN03XUBvIo+Ain7w4loT5ULt1pvZWQW2wOUl/QEpYztLay977Kp2pre9 BJZDWKXkQQH4khF/5zifD0Jsi6w6919sQuANa7Z4deSJaHBLZFhgxHPg4kbtg4Hc E5QqJ1CLead7YCmcHymDQg8pOdFpEfJV7rzlxMhd3aH5FxrzBV+dzObJTCLj0ssK RuW7QTlj4zqR9vc0R19NdK0bVlbe5TospUMl2aKnf3Or0Fz4d5KVhteiuO0sFljk e7kBDQRXu+18AQgAyUnaEsKZxgNUxrwj1SXhzPSTFNorXihN4C+WggZKcHUhzYJ+ J7LS7kuqxxiFKGxg2CaHOGMrZ0cnkySRKMcYOm2LQbt9xHxkCBgtOTi8uKyVN60j NmAUbrLONWq3qUtD3BaC4pR3xrWVrHNm+MrLXO0GWwZSuqSwpo4EzakN8JYtfPk+ akezXRk/Wn7oH4iQiuTr0xT7tSU4Jn5J0Pq/od4tKNZ6f86zOoOwBnn/RNrx3n8n fwxDKZdKFTbAkAsOyC+jbvLe5gZH7SplauyXjSw/drQtaeBJKILxapX7EK9LR0ZU gOE19KdyoE7RPK1K+Qkmv3s4IN3nNtuvELCSkwARAQABiQEfBBgBCAAJBQJXu+18 AhsMAAoJEPXv4qKALQHACWYH/33W3GIx3brWiaIryGVvfmCca0Du870L/qsQV80+ RC1nnxmN5QhWIlPDr5sWHiEmcxHT5uoQRXmmDdEXpwusd2s3PQzdC+2XSyhWOTu2 teghyTfuiB8CfYRNe5oMOOJzU2TupC8KEBzbQIwQDDd6zqnkIBy83DoYsqy8Nuze oZFcM8qDCPElIJINILluFVgHVr/jlCys7k3+UKwuJVuNEStN72rjOzx5HP/JKpHL dPPkNXErUkenIzTxmyn36tzUJohT5J+cDNKMN1umhDtdqoM4KmUQVKgqB6I53NgV NuE7QI8jdvJqjX21NqNwMVCoEgRgrCDitCR1qA9o0Nlj7QQ=
    =EcY3
    -----END PGP PUBLIC KEY BLOCK-----

    +- $s.s$s.s$ ----------------------------------------+
    | $²"$$$"²$ twinklebbs.homeip.net |
    | .$$$. winkle BBS twinklebbs.homeip.net:8080 |
    +-- .$$$$$. -----------------------------------------+
    $²"~"²$ Christopher Malo aka Pequito!

    --- Mystic BBS v1.12 A31 (Linux)
    * Origin: Twinkle BBS | (21:1/126)
  • From Vk3jed@3:633/410 to Pequito on Fri Jan 13 07:45:00 2017
    Pequito wrote to Vk3jed <=-


    I haven't been able to decrypt today's crop of messages. Anyone need my key?

    Yes please, and here is my key again.

    Will do when I open Thunderbird later. I do all of my crypto work that way, because I have Enigmail integrated into Thunderbird. :)


    ... Thesaurus: ancient reptile with an excellent vocabulary
    --- MultiMail/Win32 v0.49
    * Origin: Freeway BBS - freeway.apana.org.au (3:633/410)
  • From Avon@21:1/179 to Pequito on Fri Jan 13 11:12:00 2017
    On 01/12/17, Pequito said the following...

    "Clipboard" contained no valid encrypted data.
    When attempted to decrypt.

    OK so I am using just a single keyword to encode this and using 3DES
    algo to encode it with.. there is no public/privite key in these tests just a keyword and a certain algorythm that is in play.

    I'll send you another one now :)

    Best, Paul

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    * Origin: Cryptogenic Radix (21:1/179)
  • From bbsing@21:1/138.2 to Vk3jed on Fri Jan 13 06:34:00 2017
    I think you must make sure the '> ' is removed. gpg will not understand that stuff.

    You guys trading keys?
    Are those keys posted on the public key server?

    --- Mystic BBS v1.12 A31 (Linux)
    * Origin: CombatNet Support BBS | bbs.combatnet.us (21:1/138.2)
  • From Bbsing.Bbs@21:1/138 to Vk3jed on Sat Jan 14 01:29:00 2017
    Re: Re: Decoding this...
    By: Vk3jed to Avon on Thu Jan 12 2017 11:33 pm

    Avon wrote to Pequito <=-

    @MSGID: <587748BA.72.fsx_cry@freeway.apana.org.au>
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    * Origin: Cryptogenic Radix (21:1/179)


    I haven't been able to decrypt today's crop of messages. Anyone need my key
    ?


    ... I'm being held prisoner in a chocolate factory. Don't send help.
    --- MultiMail/Win32 v0.49
    * Origin: Freeway BBS - freeway.apana.org.au (3:633/410)
    Can I join in your tests?

    If we excahgne public keys.

    I will post my public key, in clear text (ascii armor) then import the key. Once you import the key you can encrypt to a recipiant. You can encrypt to several recipiants.

    I've been curious about posting a cypher text message.

    Let me know if I can join in your guy's fun.
    --- SBBSecho 3.00-Linux
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Bbsing.Bbs@21:1/138 to Pequito on Sat Jan 14 01:31:00 2017
    Re: Re: Decoding this...
    By: Pequito to Vk3jed on Thu Jan 12 2017 06:38 am

    On 01/12/17, Vk3jed said the following...

    Avon wrote to Pequito <=-

    @MSGID: <587748BA.72.fsx_cry@freeway.apana.org.au>
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    * Origin: Cryptogenic Radix (21:1/179)


    I haven't been able to decrypt today's crop of messages. Anyone need m
    y
    key?

    Yes please, and here is my key again.

    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v2

    mQENBFe77XwBCADH/LB8+c6W+bvozAEwodd42qTJwyy689NFZ9RM+eI2yo5q9WXu wpyU2+0KibQZMw5IztxXTDB8rBcx5emtZpywt9M8NAaXPPKn9+Ela1+CsJAhYIMg 9wLcGHHTV6HfttUQtvGUrpgGObM7qTtSntXLtfZK4caD+R0fkjRrBw+m5/sjALud 9a8h2QtXm/5j0xLjWIQV32VHvUfk5TaEhEqrsjI1K2XJf+snP4N1V8/Z902j2MQ9 K4LxXKLA6JaVSMJK8R/CiP4tFaOSm+v2o+Ln7w6/Qa353DF7Br4GAO+VRk1DhIFI u4eJW97//dfMywnNgKZCe/Efioysg+nyfDt9ABEBAAG0I0NocmlzdG9waGVyIE1h bG8gPGNfbWFsb0B5bWFpbC5jb20+iQE5BBMBCAAjBQJXu+18AhsDBwsJCAcDAgEG FQgCCQoLBBYCAwECHgECF4AACgkQ9e/iooAtAcA3MAf+LUKglNSRl7t+MUEhqB3M uHVuKUyKCcXdQf9pOEjJpYP0vfFIMqcBsq+GZsQhO03NYrVXvGMIMCCq1/0MQ6Wx wHzZzuJQiN03XUBvIo+Ain7w4loT5ULt1pvZWQW2wOUl/QEpYztLay977Kp2pre9 BJZDWKXkQQH4khF/5zifD0Jsi6w6919sQuANa7Z4deSJaHBLZFhgxHPg4kbtg4Hc E5QqJ1CLead7YCmcHymDQg8pOdFpEfJV7rzlxMhd3aH5FxrzBV+dzObJTCLj0ssK RuW7QTlj4zqR9vc0R19NdK0bVlbe5TospUMl2aKnf3Or0Fz4d5KVhteiuO0sFljk e7kBDQRXu+18AQgAyUnaEsKZxgNUxrwj1SXhzPSTFNorXihN4C+WggZKcHUhzYJ+ J7LS7kuqxxiFKGxg2CaHOGMrZ0cnkySRKMcYOm2LQbt9xHxkCBgtOTi8uKyVN60j NmAUbrLONWq3qUtD3BaC4pR3xrWVrHNm+MrLXO0GWwZSuqSwpo4EzakN8JYtfPk+ akezXRk/Wn7oH4iQiuTr0xT7tSU4Jn5J0Pq/od4tKNZ6f86zOoOwBnn/RNrx3n8n fwxDKZdKFTbAkAsOyC+jbvLe5gZH7SplauyXjSw/drQtaeBJKILxapX7EK9LR0ZU gOE19KdyoE7RPK1K+Qkmv3s4IN3nNtuvELCSkwARAQABiQEfBBgBCAAJBQJXu+18 AhsMAAoJEPXv4qKALQHACWYH/33W3GIx3brWiaIryGVvfmCca0Du870L/qsQV80+ RC1nnxmN5QhWIlPDr5sWHiEmcxHT5uoQRXmmDdEXpwusd2s3PQzdC+2XSyhWOTu2 teghyTfuiB8CfYRNe5oMOOJzU2TupC8KEBzbQIwQDDd6zqnkIBy83DoYsqy8Nuze oZFcM8qDCPElIJINILluFVgHVr/jlCys7k3+UKwuJVuNEStN72rjOzx5HP/JKpHL dPPkNXErUkenIzTxmyn36tzUJohT5J+cDNKMN1umhDtdqoM4KmUQVKgqB6I53NgV NuE7QI8jdvJqjX21NqNwMVCoEgRgrCDitCR1qA9o0Nlj7QQ=
    =EcY3
    -----END PGP PUBLIC KEY BLOCK-----

    +- $s.s$s.s$ ----------------------------------------+
    | $²"$$$"²$ twinklebbs.homeip.net |
    | .$$$. winkle BBS twinklebbs.homeip.net:8080 |
    +-- .$$$$$. -----------------------------------------+
    $²"~"²$ Christopher Malo aka Pequito!

    --- Mystic BBS v1.12 A31 (Linux)
    * Origin: Twinkle BBS | (21:1/126)
    I'll give it a try and send a message to you using your public key. :)
    --- SBBSecho 3.00-Linux
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Bbsing.Bbs@21:1/138 to Pequito on Sat Jan 14 10:51:00 2017
    Pequito wrote to Vk3jed <=-

    On 01/12/17, Vk3jed said the following...

    Avon wrote to Pequito <=-

    @MSGID: <587748BA.72.fsx_cry@freeway.apana.org.au>
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    * Origin: Cryptogenic Radix (21:1/179)


    I haven't been able to decrypt today's crop of messages. Anyone need my key?

    Yes please, and here is my key again.

    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v2

    mQENBFe77XwBCADH/LB8+c6W+bvozAEwodd42qTJwyy689NFZ9RM+eI2yo5q9WXu wpyU2+0KibQZMw5IztxXTDB8rBcx5emtZpywt9M8NAaXPPKn9+Ela1+CsJAhYIMg 9wLcGHHTV6HfttUQtvGUrpgGObM7qTtSntXLtfZK4caD+R0fkjRrBw+m5/sjALud 9a8h2QtXm/5j0xLjWIQV32VHvUfk5TaEhEqrsjI1K2XJf+snP4N1V8/Z902j2MQ9 K4LxXKLA6JaVSMJK8R/CiP4tFaOSm+v2o+Ln7w6/Qa353DF7Br4GAO+VRk1DhIFI u4eJW97//dfMywnNgKZCe/Efioysg+nyfDt9ABEBAAG0I0NocmlzdG9waGVyIE1h bG8gPGNfbWFsb0B5bWFpbC5jb20+iQE5BBMBCAAjBQJXu+18AhsDBwsJCAcDAgEG FQgCCQoLBBYCAwECHgECF4AACgkQ9e/iooAtAcA3MAf+LUKglNSRl7t+MUEhqB3M uHVuKUyKCcXdQf9pOEjJpYP0vfFIMqcBsq+GZsQhO03NYrVXvGMIMCCq1/0MQ6Wx wHzZzuJQiN03XUBvIo+Ain7w4loT5ULt1pvZWQW2wOUl/QEpYztLay977Kp2pre9 BJZDWKXkQQH4khF/5zifD0Jsi6w6919sQuANa7Z4deSJaHBLZFhgxHPg4kbtg4Hc E5QqJ1CLead7YCmcHymDQg8pOdFpEfJV7rzlxMhd3aH5FxrzBV+dzObJTCLj0ssK RuW7QTlj4zqR9vc0R19NdK0bVlbe5TospUMl2aKnf3Or0Fz4d5KVhteiuO0sFljk e7kBDQRXu+18AQgAyUnaEsKZxgNUxrwj1SXhzPSTFNorXihN4C+WggZKcHUhzYJ+ J7LS7kuqxxiFKGxg2CaHOGMrZ0cnkySRKMcYOm2LQbt9xHxkCBgtOTi8uKyVN60j NmAUbrLONWq3qUtD3BaC4pR3xrWVrHNm+MrLXO0GWwZSuqSwpo4EzakN8JYtfPk+ akezXRk/Wn7oH4iQiuTr0xT7tSU4Jn5J0Pq/od4tKNZ6f86zOoOwBnn/RNrx3n8n fwxDKZdKFTbAkAsOyC+jbvLe5gZH7SplauyXjSw/drQtaeBJKILxapX7EK9LR0ZU gOE19KdyoE7RPK1K+Qkmv3s4IN3nNtuvELCSkwARAQABiQEfBBgBCAAJBQJXu+18 AhsMAAoJEPXv4qKALQHACWYH/33W3GIx3brWiaIryGVvfmCca0Du870L/qsQV80+ RC1nnxmN5QhWIlPDr5sWHiEmcxHT5uoQRXmmDdEXpwusd2s3PQzdC+2XSyhWOTu2 teghyTfuiB8CfYRNe5oMOOJzU2TupC8KEBzbQIwQDDd6zqnkIBy83DoYsqy8Nuze oZFcM8qDCPElIJINILluFVgHVr/jlCys7k3+UKwuJVuNEStN72rjOzx5HP/JKpHL dPPkNXErUkenIzTxmyn36tzUJohT5J+cDNKMN1umhDtdqoM4KmUQVKgqB6I53NgV NuE7QI8jdvJqjX21NqNwMVCoEgRgrCDitCR1qA9o0Nlj7QQ=
    =EcY3
    -----END PGP PUBLIC KEY BLOCK-----

    +- $s.s$s.s$ ----------------------------------------+
    | $²"$$$"²$ twinklebbs.homeip.net |
    | .$$$. winkle BBS twinklebbs.homeip.net:8080 |
    +-- .$$$$$. -----------------------------------------+
    $²"~"²$ Christopher Malo aka Pequito!

    --- Mystic BBS v1.12 A31 (Linux)
    * Origin: Twinkle BBS | (21:1/126)

    import someone's key:
    gpg --import keyfile.key
    make sure you remove any tabs or extra spaces and save the public key to a
    file .. or pipe the output to gpg's input
    note there is way more to trusting keys, so just becareful who how you trust.

    view all keys:
    gpg --list-keys

    view just seceret key:
    gpg --list-secret-keys

    in the case of listing keys you will see the key id typically you see pub next
    to it.
    there often is the key size with a designated letter after 2048R/IDnumberletters
    this info is important if you want to send to recipiants based on ID and to
    use a specific key to send it.

    encrypting:
    inline incrypted or using a file
    gpg -o outputfile -e -u keyIDFrom -r keyIDtoRecipiant -a inputfile
    above the -a specifies its ascii armor



    exporting your key:
    gpg --export -a usernameORkeyID >public.key

    my public key:
    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v1

    mQENBFh57nABCADal+iC9YlQjVw2kFm4CeSxHwkXl921bYHHGIRYXfiKaVqdSD27 7m9Qopp+DHyOH3+td43p0YYjs9utRjGyCecrrz10xvaRSAdY0eeXmHT6iVlv/KJy 2HcM7mqwXWiLqTytWuzmnfCjWd5GcHIaQxGJKPqObKjGggLYFBomPC70dIsZLhX8 2KHDphcmRscAoUdtx0An0RV5mKA6kHWm7xfswVmdlcOGeAzx6cnVZeETdGAvQi9p i/cfKZqYBbEHlPE9cJL/UijFD7O7Kw2Af/LDg+9mp9vHuxnSUG64MEpfZ0nUKKox JYw1nGbeP6BQUsGvEk6dnc9flBQGvaSAcJpTABEBAAG0T2Jic2luZyAoYmJzaW5n IGJicyBiYnNpbmcuYmJzQGV3YmJzLnN5bmNyaG8ubmV0KSA8YmJzaW5nLmJic0Bl d2Jicy5zeW5jaHJvLm5ldD6JATgEEwECACIFAlh57nACGwMGCwkIBwMCBhUIAgkK CwQWAgMBAh4BAheAAAoJEDvU181JW7I63jgH/0FQTS8W5Pzgsa6cKbh1xzyz5J+I 0uv0ScGvezc6UtLmHpQRnUxOqb2A6Gj0iG/EYXDug6KbO9kQhrVk88oTfo7wX3GU JMwxkPjJUoG2/xBWahvFj4XICzRmFY3PHFtNQlXBSVsbaP3bByq924YKP+T78E5G 8vKbn1NoRShgHUOsJFtEGZj/8KWf4DR51L+1qQBJE1eIV4ZaG3BOuOhWgem2LIHU J5+T71d26qaiL/7b/v0kmbBflf7n+bV/LpmE61nWM1WZr6FwKwl0tZYL37yDLVAz gaQ6cZOPh6uzhSkZvVQZSPOfgvJgj1/I8eCdow5t+cBgvSpSA2Fwh8L2yc+5AQ0E WHnucAEIAMnUfDofN2rLqduuXaPSP1Oy1kGg56c58gq5Dw7GUeVVXtmPrfb7Nss/ OYcaxRCdGy7530as0nUhjya/3a8nohhmYAEglhhpMS0VHn9K7Mnk8rfp/+8vT0RM YwOb7R5I2Ai6v5s7Xux09pz3ublL6o8uLq/TLACto5UBWEf8oCoCA+emefUns4zh 7TSF9mlgSK3XPV1oyVD3z7zdUkEhth6pYYrIC3Q1Ak1xwKn9XDK5J5/g1FSH4lIy 6KIzI+0fOJ+L9rESnxHRlB8hMFGHzBKLR/YQwwFT+QKITJPQgzNmMuq+TS72YDrO l9GXeT7JUlhi2A1b2ibplSnzyP+5oREAEQEAAYkBHwQYAQIACQUCWHnucAIbDAAK CRA71NfNSVuyOtl9B/9xOsOa1vxsjxguLa7rY5LKj1xyZX5OMOCrmdU9fEqbFTYe NStgL0dovLZCY6n6dQc9UUZnbOcBYVnftHHtbT9+z9hKIjZT04jCdNG5EC7n0JWY 58kxzIT/D97ISXTWsGFj+jrjEK74VoQDQcM0NgAM8Z7abN2uUtzypQilxMH4zs1n BMnRk7XPjtoZ94PJcTLWJ5osqN2zAxbMdKjBWt8eZpu1d+I5RSDQjTBd4L8+oAaZ F/GQ6Ukc5vDSqEqQQ0h4mpW3suiQQXbZ3wOAmZCyndWS1JjNXlQ35SFcrlgcfs9f DdmMjpscHI4iM9FisUAolWVa8QsPPjHvmVtX9v/8
    =PAIO
    -----END PGP PUBLIC KEY BLOCK-----

    pequito .. you should be able to decrypt the text below.


    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    hQEMA8zIqvllbJyvAQgAgYvutxttXbeh6sUkhv20tCP29V7Z9CUZ1xTC/KU2JISS qw7wLalXjqUIh1OQI4Pv0pG7qOTgnSuPdelvCMpLWBx/gPJEQJL1az909IvdExfv yGMW7DoKuVHomt5wjurVBhFYPQUfxxukGm1YeDLfPDnyniD3PJm36tAmMDuiO+4j CmTALWv+/kEJoX83XV1vEU5/WC+mthtSImYpo0n2DWIbAV43/zM+JIDIc7Uu12Uw BbfUZSWlyQFgeQsfTPDbglscnmkR0ZfgrdWXIAw68oXXNzEMP44RWfYSdPfqPZov 9Kz2UCUc0trGXe7ZjYIHGz8OdsP0kMMBrqp73tzyqYUBDAOPx9yykGwrcQEH/itG IOe/doNPeMcsgZjC8yqmXmSkAOMmps1z6ouYY8G9S4cJJ5iIaaTvC/pOSrUy/DE/ GBhn5Bpua6/L/47RibkE4CQ8b2AaQHKq5LN1/b0vYKmB09ZsvBmsqjP36h49lKEg YPyaTgPu078qTNIsNFrXU5YFp6RL7sgrZeP75j2fKpOstMlEa7P/5ID938JP5u5M BvIUCcpkaCxIhYjHitfJUGCmoJS1JUGBRz2cO83d/+89sMeEZLsdilzDzyYCU4wF U7Zlecne3Yu9F6XqSs6f3ex0xIm6mLy40yFbBH0nIHsbHreXXYLR2VnabMn3Q9Ss HTIRUMu4Y3Nh+FSsm+PS6gFINWhd9RRVZa7gjzMA9KPNZbjjTf9WbCZMODtuQ7D3 Lo+uxIkF40zu+VBjwTVycuNX855YlgcD7on8+/sXswBV0Ra3fBira0E43fEtCLBD RU3Qqh5JceXFCSrTJElwiglE9fjJcfZCmM1xnzv6Yr7h+T98Kvttj9PzTib5xe0i WxqajtcYMbLwQM0D++MZDWDeLLcyjzVAsfI3pv4QwzsmLL65y2v2Ui3BYiwTeazD rQsX9rxP2ZGVZJGRmlfQfR/taQAa/+mfJfRE6eonIt7auBdVpqMNWRgYkw0rNbL+ ixzZSyN9xGwKkMbgXS+U4YB9Q+/fRN5GFlrb6+Uck1nBjyidQnMWYg1D+dQO11aE ON6N56xT10jmb7kKM/icbiMuuMZ7Oz9eVGaI8eODjsqjU8soofF72O3DYGhQIBec jfwrOsMlDieN095j29umBHwXu9l7erGSPombEJ+QhNCSCs1zAhOJ9QkX9HQbVQGK /H6SCsWMA/xaIJq3hKzY2TP4EIVowEAXEk/IfY9of4vkHPKgiBQ3YhQeo6bNrZEe AD5jCXEM85tRU3UJckcocrUFIl/HwCCfuOPHuhmjVLCC0rEqt2GjaVbemlggKuX0 DbyqNXRnuawVYp2Kb+3LiLCzXjAJ9lncjHAaYknNWCjZAopAAmYdHa1S6YkOYphW lOTRmtF/cAF1su+2eTot6FrrAJnndjlNf2LbJGf6obPD2+SLKMwdsQUfaJoP82ed k//UNii3sDHrPWc8SQbPjoCk/wfF1zEekp+SwrQ2LAj5BpHSd7evXW0SSi4f3UQN e4n6NFsn8wmMqC41hVbR/6gynxGVWNLvrTO7SBAgGJPybCP8l53O75NcXDFUAi0/ LiV9mug2r/VY9bdD7T0okUcDLWWtY5wXNXavZak98M3HQubVjoXGmAp2O2Q5xRbf WTcArpwG4WkbUwAB/2UmB0lvzHrr7pm9DkpZFTk2N7clR/fAtmJf0nFTli+BXvWR CClp6JeE65FO75rxDEHF54TFe6KYnbFn7lmy5JMQzyPvWbCqpEWzg2586ofiMVb6 FMy8e1Jm5TIQ2jvCBYQ4duB6vuuFVi4bqph7prAGamAW8ubCXdwP85lGRRIwwtPO +4UBxZ1lPlOOV/uzUYyWoaX4tgA29qMqcZ/OBPQ99NQyrJc35ipqqrhDaHqOttKG EXi2u4/GakuJnht0YuDwDdh/LNTOlAX6B7EAgnfGTiUvhGPKISe1v4BPlOG/3r1T xgAeinMwycGC4wQwc7UDHT9KwxqRG5v4E6XA9ghTq5eGmq6SAs+BGLA3h9ziR/cB EjXniWU7o5vjmSfOayVM7vY5p0iuQNjvZwjDoIHMzujpQbRh7YVZCoCnOdRAmLyf 73YRshRiljSlVqONbXhoi1MIMpr60VKEKRUA7NKYVQkkojUzv3YDsKogH5jp5C1N ZvOApQKNomRXH+LpRiQnuG9+ZXCg+rWrkick+WJaa/dYWisuIci2ZuO+S8wvHVEV IlS5DgVsmHjU0UwXUwYkPZjvi9QZ0DTldUXhw3woB9BJymCgCbkWDu+alzRVcILk T4sCoWRQkyCW44NiO+lhvyTYmgg7sczdh7YX5+dIOqTdWhi8/4sjSWOrX7aZ0G1x pH9AM2H0L7cxXRSCtsxZAlDzhopkGN/ENSSXFGrtF47HW5YUFl8Sv86MGPFlmp/+ PkRgNNyNESFkdMB6khngWGHmppx8WtlUjG5ZirbNjnXb5CKpA1+EgHdkuw1Tmt3K sHJcEdEMXpzTGuoqe5Cz5eSdpTrYdnng8rNYO3jnPTnJ07fgp5texfKlIzKkErCx aip0+9mxl/Dqf9Zub3KeG+hFrpKaTb2iejNrMK28zMvzO0QvYO9uElfCCC5nLt2k k1nYunQzoKteBIOuBj/pTfWazSO/F77sQ4DBCkoe/XYB0FPGNL8gJNr+JaYR5mE7 qqUKhTQIKNg8Tpj4nIPTIkaV0ra3WAy2ltamXNlskoX4WyXugLmkBeIHQ6roTqcC qqPsF2xgjgvIRBi/AhSoLFnBIvJhOPISlh6NGlynnD/dxnTsID5viVA+V7WWakhY Odfp83N9NL13C9PWusJeguAnLl6mg60ExUK1UgniQfFQCRZ3vunwotXzhPFDTd88 S+EX3LVa/8TbdX1etibJ+VQTa/ONZUivUooKu3V5d95vrn3BwsjolYS08hRtvt4n 8DEoGH4yZblF3yROXDiGVC/xRL2txkr7PjHRplhdkxD9vW7uYJiIZ1dHXkHvztAR px1N+MwFVJbUEQ14A6ONkeesEuJ0z8Fsknb3hHPvpmJtvu6gfY7rspTyzZIANp/v ztd6PmJBpVyDI+ScXaGSeMOVefKOFEKz6bXTMQTMHRal7zHMnVz1aCILkKcaURQj 4c7DxXfbehcpOOeUWqrQebjeAroRXhIwpEve6XpfEfwv2pHMDnWgltG3MhZyh7wN 3jDzIZQvuxS2mXlKsqnd4QERmdl0TP+yTA/VftYAaa2ztmbTYmKuckNO0EAPBVdu WHGB4BUk2rtcmntryOw4pQ0IHZ6pqDi4wwqjH8IXnnT9t5GhO3cZTFIOwGCqsVIO R6Dma+u2tAaT5C+q/s3P2PDTdvx2nuQIq2sM0aXK9UMsBCtwUSCQAc344dbOD/UI pHsd8d2bL9ZqZuVxtPb6SpVWapjQ
    =syXm
    -----END PGP MESSAGE-----

    ... ...::comptech power up::... :)bbsing(:
    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Pequito@21:1/126 to Bbsing.Bbs on Sat Jan 14 16:31:00 2017
    On 01/14/17, Bbsing.Bbs said the following...

    .. the secret is here.
    secret 0000 1101

    This was at the bottom. =)

    +- $s.s$s.s$ ----------------------------------------+
    | $²"$$$"²$ twinklebbs.homeip.net |
    | .$$$. winkle BBS twinklebbs.homeip.net:8080 |
    +-- .$$$$$. -----------------------------------------+
    $²"~"²$ Christopher Malo aka Pequito!

    --- Mystic BBS v1.12 A31 (Linux)
    * Origin: Twinkle BBS | (21:1/126)
  • From Bbsing.Bbs@21:1/138 to Pequito on Sun Jan 15 00:39:00 2017
    Re: Re: Decoding this...
    By: Pequito to Bbsing.Bbs on Sat Jan 14 2017 04:31 pm

    On 01/14/17, Bbsing.Bbs said the following...

    .. the secret is here.
    secret 0000 1101

    This was at the bottom. =)

    Awesome! It worked.
    BBS messaging can be secure! :)
    Thanks Pequito, that was a great test.
    --- SBBSecho 3.00-Linux
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From bbsing@21:1/101 to Avon on Wed Jan 18 21:31:00 2017
    Did you pass the key via private message?

    --- Mystic BBS v1.12 A31 (Windows)
    * Origin: Agency BBS | telnet://agency.bbs.geek.nz (21:1/101)
  • From Bbsing.Bbs@21:1/138 to Pequito on Sat Jan 14 10:51:00 2017
    Pequito wrote to Vk3jed <=-

    On 01/12/17, Vk3jed said the following...

    Avon wrote to Pequito <=-

    @MSGID: <587748BA.72.fsx_cry@freeway.apana.org.au>
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    * Origin: Cryptogenic Radix (21:1/179)


    I haven't been able to decrypt today's crop of messages. Anyone need my key?

    Yes please, and here is my key again.

    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v2

    mQENBFe77XwBCADH/LB8+c6W+bvozAEwodd42qTJwyy689NFZ9RM+eI2yo5q9WXu wpyU2+0KibQZMw5IztxXTDB8rBcx5emtZpywt9M8NAaXPPKn9+Ela1+CsJAhYIMg 9wLcGHHTV6HfttUQtvGUrpgGObM7qTtSntXLtfZK4caD+R0fkjRrBw+m5/sjALud 9a8h2QtXm/5j0xLjWIQV32VHvUfk5TaEhEqrsjI1K2XJf+snP4N1V8/Z902j2MQ9 K4LxXKLA6JaVSMJK8R/CiP4tFaOSm+v2o+Ln7w6/Qa353DF7Br4GAO+VRk1DhIFI u4eJW97//dfMywnNgKZCe/Efioysg+nyfDt9ABEBAAG0I0NocmlzdG9waGVyIE1h bG8gPGNfbWFsb0B5bWFpbC5jb20+iQE5BBMBCAAjBQJXu+18AhsDBwsJCAcDAgEG FQgCCQoLBBYCAwECHgECF4AACgkQ9e/iooAtAcA3MAf+LUKglNSRl7t+MUEhqB3M uHVuKUyKCcXdQf9pOEjJpYP0vfFIMqcBsq+GZsQhO03NYrVXvGMIMCCq1/0MQ6Wx wHzZzuJQiN03XUBvIo+Ain7w4loT5ULt1pvZWQW2wOUl/QEpYztLay977Kp2pre9 BJZDWKXkQQH4khF/5zifD0Jsi6w6919sQuANa7Z4deSJaHBLZFhgxHPg4kbtg4Hc E5QqJ1CLead7YCmcHymDQg8pOdFpEfJV7rzlxMhd3aH5FxrzBV+dzObJTCLj0ssK RuW7QTlj4zqR9vc0R19NdK0bVlbe5TospUMl2aKnf3Or0Fz4d5KVhteiuO0sFljk e7kBDQRXu+18AQgAyUnaEsKZxgNUxrwj1SXhzPSTFNorXihN4C+WggZKcHUhzYJ+ J7LS7kuqxxiFKGxg2CaHOGMrZ0cnkySRKMcYOm2LQbt9xHxkCBgtOTi8uKyVN60j NmAUbrLONWq3qUtD3BaC4pR3xrWVrHNm+MrLXO0GWwZSuqSwpo4EzakN8JYtfPk+ akezXRk/Wn7oH4iQiuTr0xT7tSU4Jn5J0Pq/od4tKNZ6f86zOoOwBnn/RNrx3n8n fwxDKZdKFTbAkAsOyC+jbvLe5gZH7SplauyXjSw/drQtaeBJKILxapX7EK9LR0ZU gOE19KdyoE7RPK1K+Qkmv3s4IN3nNtuvELCSkwARAQABiQEfBBgBCAAJBQJXu+18 AhsMAAoJEPXv4qKALQHACWYH/33W3GIx3brWiaIryGVvfmCca0Du870L/qsQV80+ RC1nnxmN5QhWIlPDr5sWHiEmcxHT5uoQRXmmDdEXpwusd2s3PQzdC+2XSyhWOTu2 teghyTfuiB8CfYRNe5oMOOJzU2TupC8KEBzbQIwQDDd6zqnkIBy83DoYsqy8Nuze oZFcM8qDCPElIJINILluFVgHVr/jlCys7k3+UKwuJVuNEStN72rjOzx5HP/JKpHL dPPkNXErUkenIzTxmyn36tzUJohT5J+cDNKMN1umhDtdqoM4KmUQVKgqB6I53NgV NuE7QI8jdvJqjX21NqNwMVCoEgRgrCDitCR1qA9o0Nlj7QQ=
    =EcY3
    -----END PGP PUBLIC KEY BLOCK-----

    +- $s.s$s.s$ ----------------------------------------+
    | $²"$$$"²$ twinklebbs.homeip.net |
    | .$$$. winkle BBS twinklebbs.homeip.net:8080 |
    +-- .$$$$$. -----------------------------------------+
    $²"~"²$ Christopher Malo aka Pequito!

    --- Mystic BBS v1.12 A31 (Linux)
    * Origin: Twinkle BBS | (21:1/126)

    import someone's key:
    gpg --import keyfile.key
    make sure you remove any tabs or extra spaces and save the public key to a
    file .. or pipe the output to gpg's input
    note there is way more to trusting keys, so just becareful who how you trust.

    view all keys:
    gpg --list-keys

    view just seceret key:
    gpg --list-secret-keys

    in the case of listing keys you will see the key id typically you see pub next
    to it.
    there often is the key size with a designated letter after 2048R/IDnumberletters
    this info is important if you want to send to recipiants based on ID and to
    use a specific key to send it.

    encrypting:
    inline incrypted or using a file
    gpg -o outputfile -e -u keyIDFrom -r keyIDtoRecipiant -a inputfile
    above the -a specifies its ascii armor



    exporting your key:
    gpg --export -a usernameORkeyID >public.key

    my public key:
    -----BEGIN PGP PUBLIC KEY BLOCK-----
    Version: GnuPG v1

    mQENBFh57nABCADal+iC9YlQjVw2kFm4CeSxHwkXl921bYHHGIRYXfiKaVqdSD27 7m9Qopp+DHyOH3+td43p0YYjs9utRjGyCecrrz10xvaRSAdY0eeXmHT6iVlv/KJy 2HcM7mqwXWiLqTytWuzmnfCjWd5GcHIaQxGJKPqObKjGggLYFBomPC70dIsZLhX8 2KHDphcmRscAoUdtx0An0RV5mKA6kHWm7xfswVmdlcOGeAzx6cnVZeETdGAvQi9p i/cfKZqYBbEHlPE9cJL/UijFD7O7Kw2Af/LDg+9mp9vHuxnSUG64MEpfZ0nUKKox JYw1nGbeP6BQUsGvEk6dnc9flBQGvaSAcJpTABEBAAG0T2Jic2luZyAoYmJzaW5n IGJicyBiYnNpbmcuYmJzQGV3YmJzLnN5bmNyaG8ubmV0KSA8YmJzaW5nLmJic0Bl d2Jicy5zeW5jaHJvLm5ldD6JATgEEwECACIFAlh57nACGwMGCwkIBwMCBhUIAgkK CwQWAgMBAh4BAheAAAoJEDvU181JW7I63jgH/0FQTS8W5Pzgsa6cKbh1xzyz5J+I 0uv0ScGvezc6UtLmHpQRnUxOqb2A6Gj0iG/EYXDug6KbO9kQhrVk88oTfo7wX3GU JMwxkPjJUoG2/xBWahvFj4XICzRmFY3PHFtNQlXBSVsbaP3bByq924YKP+T78E5G 8vKbn1NoRShgHUOsJFtEGZj/8KWf4DR51L+1qQBJE1eIV4ZaG3BOuOhWgem2LIHU J5+T71d26qaiL/7b/v0kmbBflf7n+bV/LpmE61nWM1WZr6FwKwl0tZYL37yDLVAz gaQ6cZOPh6uzhSkZvVQZSPOfgvJgj1/I8eCdow5t+cBgvSpSA2Fwh8L2yc+5AQ0E WHnucAEIAMnUfDofN2rLqduuXaPSP1Oy1kGg56c58gq5Dw7GUeVVXtmPrfb7Nss/ OYcaxRCdGy7530as0nUhjya/3a8nohhmYAEglhhpMS0VHn9K7Mnk8rfp/+8vT0RM YwOb7R5I2Ai6v5s7Xux09pz3ublL6o8uLq/TLACto5UBWEf8oCoCA+emefUns4zh 7TSF9mlgSK3XPV1oyVD3z7zdUkEhth6pYYrIC3Q1Ak1xwKn9XDK5J5/g1FSH4lIy 6KIzI+0fOJ+L9rESnxHRlB8hMFGHzBKLR/YQwwFT+QKITJPQgzNmMuq+TS72YDrO l9GXeT7JUlhi2A1b2ibplSnzyP+5oREAEQEAAYkBHwQYAQIACQUCWHnucAIbDAAK CRA71NfNSVuyOtl9B/9xOsOa1vxsjxguLa7rY5LKj1xyZX5OMOCrmdU9fEqbFTYe NStgL0dovLZCY6n6dQc9UUZnbOcBYVnftHHtbT9+z9hKIjZT04jCdNG5EC7n0JWY 58kxzIT/D97ISXTWsGFj+jrjEK74VoQDQcM0NgAM8Z7abN2uUtzypQilxMH4zs1n BMnRk7XPjtoZ94PJcTLWJ5osqN2zAxbMdKjBWt8eZpu1d+I5RSDQjTBd4L8+oAaZ F/GQ6Ukc5vDSqEqQQ0h4mpW3suiQQXbZ3wOAmZCyndWS1JjNXlQ35SFcrlgcfs9f DdmMjpscHI4iM9FisUAolWVa8QsPPjHvmVtX9v/8
    =PAIO
    -----END PGP PUBLIC KEY BLOCK-----

    pequito .. you should be able to decrypt the text below.


    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    hQEMA8zIqvllbJyvAQgAgYvutxttXbeh6sUkhv20tCP29V7Z9CUZ1xTC/KU2JISS qw7wLalXjqUIh1OQI4Pv0pG7qOTgnSuPdelvCMpLWBx/gPJEQJL1az909IvdExfv yGMW7DoKuVHomt5wjurVBhFYPQUfxxukGm1YeDLfPDnyniD3PJm36tAmMDuiO+4j CmTALWv+/kEJoX83XV1vEU5/WC+mthtSImYpo0n2DWIbAV43/zM+JIDIc7Uu12Uw BbfUZSWlyQFgeQsfTPDbglscnmkR0ZfgrdWXIAw68oXXNzEMP44RWfYSdPfqPZov 9Kz2UCUc0trGXe7ZjYIHGz8OdsP0kMMBrqp73tzyqYUBDAOPx9yykGwrcQEH/itG IOe/doNPeMcsgZjC8yqmXmSkAOMmps1z6ouYY8G9S4cJJ5iIaaTvC/pOSrUy/DE/ GBhn5Bpua6/L/47RibkE4CQ8b2AaQHKq5LN1/b0vYKmB09ZsvBmsqjP36h49lKEg YPyaTgPu078qTNIsNFrXU5YFp6RL7sgrZeP75j2fKpOstMlEa7P/5ID938JP5u5M BvIUCcpkaCxIhYjHitfJUGCmoJS1JUGBRz2cO83d/+89sMeEZLsdilzDzyYCU4wF U7Zlecne3Yu9F6XqSs6f3ex0xIm6mLy40yFbBH0nIHsbHreXXYLR2VnabMn3Q9Ss HTIRUMu4Y3Nh+FSsm+PS6gFINWhd9RRVZa7gjzMA9KPNZbjjTf9WbCZMODtuQ7D3 Lo+uxIkF40zu+VBjwTVycuNX855YlgcD7on8+/sXswBV0Ra3fBira0E43fEtCLBD RU3Qqh5JceXFCSrTJElwiglE9fjJcfZCmM1xnzv6Yr7h+T98Kvttj9PzTib5xe0i WxqajtcYMbLwQM0D++MZDWDeLLcyjzVAsfI3pv4QwzsmLL65y2v2Ui3BYiwTeazD rQsX9rxP2ZGVZJGRmlfQfR/taQAa/+mfJfRE6eonIt7auBdVpqMNWRgYkw0rNbL+ ixzZSyN9xGwKkMbgXS+U4YB9Q+/fRN5GFlrb6+Uck1nBjyidQnMWYg1D+dQO11aE ON6N56xT10jmb7kKM/icbiMuuMZ7Oz9eVGaI8eODjsqjU8soofF72O3DYGhQIBec jfwrOsMlDieN095j29umBHwXu9l7erGSPombEJ+QhNCSCs1zAhOJ9QkX9HQbVQGK /H6SCsWMA/xaIJq3hKzY2TP4EIVowEAXEk/IfY9of4vkHPKgiBQ3YhQeo6bNrZEe AD5jCXEM85tRU3UJckcocrUFIl/HwCCfuOPHuhmjVLCC0rEqt2GjaVbemlggKuX0 DbyqNXRnuawVYp2Kb+3LiLCzXjAJ9lncjHAaYknNWCjZAopAAmYdHa1S6YkOYphW lOTRmtF/cAF1su+2eTot6FrrAJnndjlNf2LbJGf6obPD2+SLKMwdsQUfaJoP82ed k//UNii3sDHrPWc8SQbPjoCk/wfF1zEekp+SwrQ2LAj5BpHSd7evXW0SSi4f3UQN e4n6NFsn8wmMqC41hVbR/6gynxGVWNLvrTO7SBAgGJPybCP8l53O75NcXDFUAi0/ LiV9mug2r/VY9bdD7T0okUcDLWWtY5wXNXavZak98M3HQubVjoXGmAp2O2Q5xRbf WTcArpwG4WkbUwAB/2UmB0lvzHrr7pm9DkpZFTk2N7clR/fAtmJf0nFTli+BXvWR CClp6JeE65FO75rxDEHF54TFe6KYnbFn7lmy5JMQzyPvWbCqpEWzg2586ofiMVb6 FMy8e1Jm5TIQ2jvCBYQ4duB6vuuFVi4bqph7prAGamAW8ubCXdwP85lGRRIwwtPO +4UBxZ1lPlOOV/uzUYyWoaX4tgA29qMqcZ/OBPQ99NQyrJc35ipqqrhDaHqOttKG EXi2u4/GakuJnht0YuDwDdh/LNTOlAX6B7EAgnfGTiUvhGPKISe1v4BPlOG/3r1T xgAeinMwycGC4wQwc7UDHT9KwxqRG5v4E6XA9ghTq5eGmq6SAs+BGLA3h9ziR/cB EjXniWU7o5vjmSfOayVM7vY5p0iuQNjvZwjDoIHMzujpQbRh7YVZCoCnOdRAmLyf 73YRshRiljSlVqONbXhoi1MIMpr60VKEKRUA7NKYVQkkojUzv3YDsKogH5jp5C1N ZvOApQKNomRXH+LpRiQnuG9+ZXCg+rWrkick+WJaa/dYWisuIci2ZuO+S8wvHVEV IlS5DgVsmHjU0UwXUwYkPZjvi9QZ0DTldUXhw3woB9BJymCgCbkWDu+alzRVcILk T4sCoWRQkyCW44NiO+lhvyTYmgg7sczdh7YX5+dIOqTdWhi8/4sjSWOrX7aZ0G1x pH9AM2H0L7cxXRSCtsxZAlDzhopkGN/ENSSXFGrtF47HW5YUFl8Sv86MGPFlmp/+ PkRgNNyNESFkdMB6khngWGHmppx8WtlUjG5ZirbNjnXb5CKpA1+EgHdkuw1Tmt3K sHJcEdEMXpzTGuoqe5Cz5eSdpTrYdnng8rNYO3jnPTnJ07fgp5texfKlIzKkErCx aip0+9mxl/Dqf9Zub3KeG+hFrpKaTb2iejNrMK28zMvzO0QvYO9uElfCCC5nLt2k k1nYunQzoKteBIOuBj/pTfWazSO/F77sQ4DBCkoe/XYB0FPGNL8gJNr+JaYR5mE7 qqUKhTQIKNg8Tpj4nIPTIkaV0ra3WAy2ltamXNlskoX4WyXugLmkBeIHQ6roTqcC qqPsF2xgjgvIRBi/AhSoLFnBIvJhOPISlh6NGlynnD/dxnTsID5viVA+V7WWakhY Odfp83N9NL13C9PWusJeguAnLl6mg60ExUK1UgniQfFQCRZ3vunwotXzhPFDTd88 S+EX3LVa/8TbdX1etibJ+VQTa/ONZUivUooKu3V5d95vrn3BwsjolYS08hRtvt4n 8DEoGH4yZblF3yROXDiGVC/xRL2txkr7PjHRplhdkxD9vW7uYJiIZ1dHXkHvztAR px1N+MwFVJbUEQ14A6ONkeesEuJ0z8Fsknb3hHPvpmJtvu6gfY7rspTyzZIANp/v ztd6PmJBpVyDI+ScXaGSeMOVefKOFEKz6bXTMQTMHRal7zHMnVz1aCILkKcaURQj 4c7DxXfbehcpOOeUWqrQebjeAroRXhIwpEve6XpfEfwv2pHMDnWgltG3MhZyh7wN 3jDzIZQvuxS2mXlKsqnd4QERmdl0TP+yTA/VftYAaa2ztmbTYmKuckNO0EAPBVdu WHGB4BUk2rtcmntryOw4pQ0IHZ6pqDi4wwqjH8IXnnT9t5GhO3cZTFIOwGCqsVIO R6Dma+u2tAaT5C+q/s3P2PDTdvx2nuQIq2sM0aXK9UMsBCtwUSCQAc344dbOD/UI pHsd8d2bL9ZqZuVxtPb6SpVWapjQ
    =syXm
    -----END PGP MESSAGE-----

    ... ...::comptech power up::... :)bbsing(:
    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Bbsing.Bbs@21:1/138 to Pequito on Sun Jan 15 05:10:00 2017
    Pequito wrote to Bbsing.Bbs <=-

    On 01/14/17, Bbsing.Bbs said the following...

    .. the secret is here.
    secret 0000 1101

    This was at the bottom. =)

    Perfect! It worked.

    BBS systems can have secure message communication! :)



    ... ...::comptech power up::... :)bbsing(:
    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Vk3jed@3:633/410 to Bbsing.Bbs on Tue Aug 22 10:02:00 2017
    Bbsing.Bbs wrote to Pequito <=-

    @TZ: 40f0
    Pequito wrote to Bbsing.Bbs <=-

    On 01/14/17, Bbsing.Bbs said the following...

    .. the secret is here.
    secret 0000 1101

    This was at the bottom. =)

    Perfect! It worked.

    BBS systems can have secure message communication! :)

    Cool, what was the total process?


    ... Flashlight: A case for holding dead batteries.
    --- MultiMail/Win32 v0.49
    * Origin: Freeway BBS - freeway.apana.org.au (3:633/410)
  • From Vk3jed@3:633/410 to bbsing on Sat Jan 14 08:35:00 2017
    bbsing wrote to Vk3jed <=-

    @MSGID: <5878BE0B.82.fsx_cry@freeway.apana.org.au>
    @TZ: 412c
    I think you must make sure the '> ' is removed. gpg will not
    understand that stuff.

    There was no > when I read it. :)

    You guys trading keys?
    Are those keys posted on the public key server?

    Yeah, I posted mine the other day in here.


    ... Budget: a mathematical confirmation of your suspicions...
    --- MultiMail/Win32 v0.49
    * Origin: Freeway BBS - freeway.apana.org.au (3:633/410)
  • From Vk3jed@3:633/410 to Bbsing.Bbs on Sat Jan 14 21:46:00 2017
    Bbsing.Bbs wrote to Vk3jed <=-

    Can I join in your tests?

    If we excahgne public keys.

    Sure, that's what this echo is for. :)


    ... A new cemetery opened in town: folks are dying to enter.
    --- MultiMail/Win32 v0.49
    * Origin: Freeway BBS - freeway.apana.org.au (3:633/410)
  • From Avon@21:1/175 to Pequito on Thu Jan 12 22:10:00 2017
    -----BEGIN PGP MESSAGE-----
    Version: GnuPG v1

    jA0EAgMC6lhJCIGjyRhgyZSjdWKre6cUKuwlDIF0sfx3zr4lBox55Orn8/+FgKTf DtAwHtW2TwOCypPLYXOw3hEQLzqwi6hX7P59gcTDl0FndpreI4osPazV/15dH19S VqSb5wZluBcfu1AHEvq/48VfmX6wYWAnwWN1H0ZGVOtl69WFhLUGgVs1sgnUUjNR hfgReVgygJPPFxekGp5r5WMa926A
    =Qabr
    -----END PGP MESSAGE-----

    --- Mystic BBS v1.12 A31 (Raspberry Pi)
    # Origin: Cryptogenic Radix (21:1/179)
    * Origin: CCO BBS - capitolcityonline.net:26 (21:1/175)
  • From Bbsing.Bbs@21:1/138 to Vk3jed on Wed Jul 31 21:24:00 2019
    Vk3jed wrote to Bbsing.Bbs <=-

    Perfect! It worked.

    BBS systems can have secure message communication! :)

    Cool, what was the total process?
    Sorry Vk, I went dark for awhile due to projects I was working on, and you may have the process already.

    Ah .. so if I can remember the total process...
    Here is the general process.

    make sure you have a pgp/gpg key, post your public key for the initial async encryption ... this is the type where you receive someone's posted public key and then add that to your keystore, then craft a message for that person's key.

    Now if its just synchronous then... they've sent you a shared single key.

    Here on the bbs or fido, .. other packet mails you can post the message using gpg output of ascii armor ... which is basically clear text. This text you'll also use to post your key but you can use binary formats. I like the armor text style because its really versatil.

    So if we were trading messages and we did not have a single shared key we would use asynchronous encryption to trade the key, or via phone ... something like that.

    1) get gnupgp
    2) create a private key 4096 bit
    a) smaller key sizes allow for easier signature line use, but may cost
    in compromised communicates if cracked.
    3) output your public key to a file in armor text
    4) place your public key in a signature line
    5) anyone can get your public key and send you a private message that only you can unlock.

    openssl allows for armor text as well, but from the perspective of regular message communications like this one, only synchronous encryption (shared key).


    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Vk3jed@21:1/109 to Bbsing.Bbs on Thu Aug 1 18:21:00 2019
    On 07-31-19 21:24, Bbsing.Bbs wrote to Vk3jed <=-

    Vk3jed wrote to Bbsing.Bbs <=-

    Perfect! It worked.

    BBS systems can have secure message communication! :)

    Cool, what was the total process?
    Sorry Vk, I went dark for awhile due to projects I was working on, and
    you may have the process already.

    Ah .. so if I can remember the total process...
    Here is the general process.

    I know it for one on one, but for group communications, what happens?



    ... Is this now?
    === MultiMail/Win v0.51
    --- SBBSecho 3.03-Linux
    * Origin: Freeway BBS Bendigo,Australia freeway.apana.org.au (21:1/109)
  • From Avon@21:1/101 to Vk3jed on Thu Aug 1 21:59:18 2019
    On 01 Aug 2019 at 06:21p, Vk3jed pondered and said...

    I know it for one on one, but for group communications, what happens?

    Good question... perhaps we can work on something ? :)

    --- Mystic BBS v1.12 A43 2019/03/03 (Windows/32)
    * Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (21:1/101)
  • From Vk3jed@21:1/109 to Avon on Thu Aug 1 21:07:00 2019
    On 08-01-19 21:59, Avon wrote to Vk3jed <=-

    On 01 Aug 2019 at 06:21p, Vk3jed pondered and said...

    I know it for one on one, but for group communications, what happens?

    Good question... perhaps we can work on something ? :)

    Yeah. :)


    ... I don't hallucinate anymore, the Thing driving the UFO cured me...
    === MultiMail/Win v0.51
    --- SBBSecho 3.03-Linux
    * Origin: Freeway BBS Bendigo,Australia freeway.apana.org.au (21:1/109)
  • From Bbsing.Bbs@21:1/138 to Vk3jed on Thu Aug 1 21:34:00 2019
    Vk3jed wrote to Bbsing.Bbs <=-

    On 07-31-19 21:24, Bbsing.Bbs wrote to Vk3jed <=-

    Vk3jed wrote to Bbsing.Bbs <=-

    Perfect! It worked.

    BBS systems can have secure message communication! :)
    I know it for one on one, but for group communications, what happens?

    As many public keys you have, .. maybe you scraped/captures them from bbses or other places, any public key contained in the encrypted message, will allow all those with matching private keys to view/decrypt the message.

    Say you have created a message addressed to 3 people. During the process of assigning who should received the message [recipients], .. and you can add lots of them.
    When you post the ascii armor message on the BBS or wherever they have to actually download the message to the location where the private key exists.

    This means offline mail reader or something like that.
    The problem with private keys is they can't get into the possession of anyone but the owner, otherwise there is no non-repudiation! That is really important, and it has been mentioned in another post at some point about Proton mail and ... I think it was keybase.

    The short is .. on a bbs, like old school types, I don't know how it would work for that. I think there are ways, like software to create an encrypted tunnel into a stateless container that is only active for the time when the user is decrypting and reading the message.

    Lets say you upload your private key in the tunnel, (which I do all the time .. ssh tunnels) import it to the keyring and have the message imported to the container, the user decrypts, reads, then exits, and the container vanishes. Same would work for composition, and the output is the message to the bbs.

    The big flaw is trust, .. and if you've used containers, or cloud based systems, you know the owners of those systems ultimately have control of them, but.. that doesn't mean you can't create an encrypted container somehow or within an encrypted file system that the user supplies the key for like an ssl key.


    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Vk3jed@21:1/109 to Bbsing.Bbs on Fri Aug 2 20:06:00 2019
    On 08-01-19 21:34, Bbsing.Bbs wrote to Vk3jed <=-

    As many public keys you have, .. maybe you scraped/captures them from bbses or other places, any public key contained in the encrypted
    message, will allow all those with matching private keys to
    view/decrypt the message.

    Hmm, OK. :) So multiplie ciphertexts, each a copy of the same plaintext

    This means offline mail reader or something like that.
    The problem with private keys is they can't get into the possession of anyone but the owner, otherwise there is no non-repudiation! That is really important, and it has been mentioned in another post at some
    point about Proton mail and ... I think it was keybase.

    Offline mail does work well for PGP/GPG. I used to have a PGP add-on for Bluewave back in the day. A similar add-on could work for GPG and Multimail. It hooked the editor, the offline reader would call the encryption system, and if you wanted to write a message, the system would then pass control to the actual editor.

    The short is .. on a bbs, like old school types, I don't know how it would work for that. I think there are ways, like software to create an encrypted tunnel into a stateless container that is only active for the time when the user is decrypting and reading the message.

    Yeah, good question. :)


    ... I DID IT! I invented the unadoptable tagline! Try it. Won't work.
    === MultiMail/Win v0.51
    --- SBBSecho 3.03-Linux
    * Origin: Freeway BBS Bendigo,Australia freeway.apana.org.au (21:1/109)
  • From Bbsing.Bbs@21:1/138 to Vk3jed on Fri Aug 2 23:48:00 2019
    Vk3jed wrote to Bbsing.Bbs <=-


    Hmm, OK. :) So multiplie ciphertexts, each a copy of the same
    plaintext

    No.., one cyber text, but within the encoded message exists multiple public keys.
    I haven't tried to actually identify a public key in a cyber text message outside of the gnugp functions. .. you can imagine though, the more public keys aka recipients, the larger the cyber text message can get.


    Offline mail does work well for PGP/GPG. I used to have a PGP add-on
    for Bluewave back in the day. A similar add-on could work for GPG and Multimail. It hooked the editor, the offline reader would call the encryption system, and if you wanted to write a message, the system
    would then pass control to the actual editor.

    I have not tried bluewave yet.

    VK, you doing anything with encryption these days?

    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Avon@21:1/101 to Bbsing.Bbs on Thu Aug 8 12:52:49 2019
    On 02 Aug 2019 at 11:48p, Bbsing.Bbs pondered and said...

    VK, you doing anything with encryption these days?

    I'm looking to do some more in this space in the coming months... have a few ideas we might be able to test out. When I do, can I pick your brains about them? :)

    Best, Paul

    --- Mystic BBS v1.12 A43 2019/03/03 (Windows/32)
    * Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (21:1/101)
  • From Vk3jed@21:1/109 to Bbsing.Bbs on Thu Aug 8 12:38:00 2019
    On 08-02-19 23:48, Bbsing.Bbs wrote to Vk3jed <=-

    Vk3jed wrote to Bbsing.Bbs <=-


    Hmm, OK. :) So multiplie ciphertexts, each a copy of the same
    plaintext

    No.., one cyber text, but within the encoded message exists multiple public keys.
    I haven't tried to actually identify a public key in a cyber text
    message outside of the gnugp functions. .. you can imagine though, the more public keys aka recipients, the larger the cyber text message can get.

    But given that encryption is normally done by a combination of public and private keys in pairs, how does that work?


    Offline mail does work well for PGP/GPG. I used to have a PGP add-on
    for Bluewave back in the day. A similar add-on could work for GPG and Multimail. It hooked the editor, the offline reader would call the encryption system, and if you wanted to write a message, the system
    would then pass control to the actual editor.

    I have not tried bluewave yet.

    I should have a working PGP/Bluewave setup in my old backups somewhere. Have to see if it can be tweaked to use GPG.

    VK, you doing anything with encryption these days?

    No, though I have the capability using Enigmail on Thunderbird, and a personal gated feed for this echo.


    ... Stick: A boomerang that doesn't work.
    === MultiMail/Win v0.51
    --- SBBSecho 3.03-Linux
    * Origin: Freeway BBS Bendigo,Australia freeway.apana.org.au (21:1/109)
  • From jeff@21:1/180 to Avon on Wed Aug 7 23:18:17 2019
    On 08 Aug 2019, Avon said the following...
    I'm looking to do some more in this space in the coming months... have a few ideas we might be able to test out. When I do, can I pick your
    brains about them? :)

    What would you think about a "Puzzle of the Week" sort of thing, in which a short, random plaintext is encrypted each week, using variable encryption techniques, for folks to try to crack? No RSA-level stuff (which I'm
    guessing is the intended subject for this area), but start out with
    simple substitution cryptograms and progress from there. Thoughts?

    Jeff.

    --- Mystic BBS v1.12 A43 2019/03/03 (Raspberry Pi/32)
    * Origin: Perceptronica (21:1/180)
  • From Avon@21:1/101 to jeff on Thu Aug 8 19:36:14 2019
    On 07 Aug 2019 at 11:18p, jeff pondered and said...

    What would you think about a "Puzzle of the Week" sort of thing, in
    which a short, random plaintext is encrypted each week, using variable encryption techniques, for folks to try to crack? No RSA-level stuff (which I'm guessing is the intended subject for this area), but start
    out with simple substitution cryptograms and progress from there. Thoughts?

    I like the idea and I'm really open to anything.

    :)

    --- Mystic BBS v1.12 A43 2019/03/03 (Windows/32)
    * Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (21:1/101)
  • From Bbsing.Bbs@21:1/138 to Avon on Wed Aug 7 21:23:00 2019
    Avon wrote to Bbsing.Bbs <=-

    On 02 Aug 2019 at 11:48p, Bbsing.Bbs pondered and said...

    VK, you doing anything with encryption these days?

    I'm looking to do some more in this space in the coming months... have
    a few ideas we might be able to test out. When I do, can I pick your brains about them? :)

    Best, Paul

    Of course.

    ttyl8r

    BBSING

    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Bbsing.Bbs@21:1/138 to Vk3jed on Thu Aug 8 10:51:00 2019
    Vk3jed wrote to Bbsing.Bbs <=-

    On 08-02-19 23:48, Bbsing.Bbs wrote to Vk3jed <=-

    Vk3jed wrote to Bbsing.Bbs <=-


    Hmm, OK. :) So multiplie ciphertexts, each a copy of the same
    plaintext

    No.., one cyber text, but within the encoded message exists multiple public keys.
    I haven't tried to actually identify a public key in a cyber text
    message outside of the gnugp functions. .. you can imagine though, the more public keys aka recipients, the larger the cyber text message can get.

    But given that encryption is normally done by a combination of public
    and private keys in pairs, how does that work?
    What I haven't done is look at a few file attributes where adding more public keys increases the size of the ascii armor file.

    If it does increase, then you could possibly assume mathematically that the difference between the same message with 1 recipient vs 2 recipient where recipient 1 is in both messages, the difference would be recipient 2 and you would be able to obtain their public key.

    How to find out? .. well it may be possible via gnupg.
    If you are in the recipient list, .. maybe remove all your secret keys from your key ring, and attempt to decrypt using gnupg and see what keys its asking for. Once you find out, then you can re-import your key and attempt to pull the other recipients public key out.

    A major problem exits due to salting. Where salting makes each encrypted message unique so how to overcome that where you have the original message, your public key, and some other unknown key inside the message, the deduction starts with (the message + your public key) - (unknown recipient public key. salt .. now you have this other unknown.

    I will have to spin up a vm and attempt these test. I've never tried it. I'm sure someone has already thought of this and tested it, but I've never research it before.

    In cases of cracking .. its best to just obtain the users key ring, and attempt brute force on each secret key.

    Offline mail does work well for PGP/GPG. I used to have a PGP add-on
    for Bluewave back in the day. A similar add-on could work for GPG and Multimail. It hooked the editor, the offline reader would call the encryption system, and if you wanted to write a message, the system
    would then pass control to the actual editor.

    I will have to attempt to enable pgp for multimail.

    ... BBSING
    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Vk3jed@21:1/109 to Bbsing.Bbs on Tue Aug 13 19:23:00 2019
    On 08-08-19 10:51, Bbsing.Bbs wrote to Vk3jed <=-

    I will have to spin up a vm and attempt these test. I've never tried
    it. I'm sure someone has already thought of this and tested it, but
    I've never research it before.

    I'm not up with encryption to this level. :) But curious what you find.

    In cases of cracking .. its best to just obtain the users key ring, and attempt brute force on each secret key.

    Yes, but we were discussing sending a message to multiple recipients.

    Offline mail does work well for PGP/GPG. I used to have a PGP add-on
    for Bluewave back in the day. A similar add-on could work for GPG and Multimail. It hooked the editor, the offline reader would call the encryption system, and if you wanted to write a message, the system
    would then pass control to the actual editor.

    I will have to attempt to enable pgp for multimail.

    I haven't seen an interface for GPG available for Multimail yet.


    ... Don't argue with he who buys ink by the gallon.
    === MultiMail/Win v0.51
    --- SBBSecho 3.03-Linux
    * Origin: Freeway BBS Bendigo,Australia freeway.apana.org.au (21:1/109)
  • From Spectre@21:3/105 to Vk3jed on Tue Aug 13 23:22:00 2019
    ... Don't argue with he who buys ink by the gallon. === MultiMail/Win

    He might be a tatooist.


    *** THE READER V4.50 [freeware]

    ---
    * Origin: Ooooh look a "Default origin line" kill it quick (21:3/105)
  • From Joacim Melin@21:2/130 to Spectre on Tue Aug 13 19:23:26 2019
    ... Don't argue with he who buys ink by the gallon. === MultiMail/Win

    He might be a tatooist.

    On Tatooine.


    --- NiKom v2.5.0
    * Origin: Delta City (deltacity.se, Vallentuna, Sweden) (21:2/130.0)
  • From Nightfox@21:1/137 to Joacim Melin on Tue Aug 13 12:41:43 2019
    Re: Re: Decoding this...
    By: Joacim Melin to Spectre on Tue Aug 13 2019 07:23 pm

    He might be a tatooist.

    On Tatooine.

    Isn't that where all the best tattoo artists go to study their craft?

    Nightfox
    --- SBBSecho 3.08-Win32
    * Origin: Digital Distortion: digdist.synchro.net (21:1/137)
  • From Vk3jed@21:1/109 to Spectre on Wed Aug 14 08:06:00 2019
    On 08-13-19 23:22, Spectre wrote to Vk3jed <=-

    ... Don't argue with he who buys ink by the gallon. === MultiMail/Win

    He might be a tatooist.

    Haha good point. :)


    ... What if I told you you can't hurt the newcomers?
    === MultiMail/Win v0.51
    --- SBBSecho 3.03-Linux
    * Origin: Freeway BBS Bendigo,Australia freeway.apana.org.au (21:1/109)
  • From Bbsing.Bbs@21:1/138 to Vk3jed on Tue Aug 13 16:38:00 2019
    Vk3jed wrote to Bbsing.Bbs <=-

    On 08-08-19 10:51, Bbsing.Bbs wrote to Vk3jed <=-

    I will have to attempt to enable pgp for multimail.

    I haven't seen an interface for GPG available for Multimail yet.

    Me either, and this is what makes things a little more difficult to use all the time. In fact its that level of difficulty and the fact that the huge mail providers don't want to make encryption easy for their users, that prevent everyone from adopting it now.

    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Joacim Melin@21:2/130 to Nightfox on Wed Aug 14 09:23:22 2019
    Re: Re: Decoding this...
    By: Joacim Melin to Spectre on Tue Aug 13 2019 07:23 pm

    He might be a tatooist.

    On Tatooine.

    Isn't that where all the best tattoo artists go to study their craft?

    Nightfox

    So I hear.


    --- NiKom v2.5.0
    * Origin: Delta City (deltacity.se, Vallentuna, Sweden) (21:2/130.0)
  • From Vk3jed@21:1/109 to Bbsing.Bbs on Wed Aug 14 14:40:00 2019
    On 08-13-19 16:38, Bbsing.Bbs wrote to Vk3jed <=-

    Vk3jed wrote to Bbsing.Bbs <=-

    On 08-08-19 10:51, Bbsing.Bbs wrote to Vk3jed <=-

    I will have to attempt to enable pgp for multimail.

    I haven't seen an interface for GPG available for Multimail yet.

    Me either, and this is what makes things a little more difficult to use all the time. In fact its that level of difficulty and the fact that
    the huge mail providers don't want to make encryption easy for their users, that prevent everyone from adopting it now.

    It just needs to be a wrapper for the editor function to make all the GPG functions available. Or alternatively, work with the Multimail developer to have GPG support integrated in, in a similar manner to the Enigmail plugin for Tnunderbird.


    ... All wiyht. Rho sritched mg kegtops awound?
    === MultiMail/Win v0.51
    --- SBBSecho 3.03-Linux
    * Origin: Freeway BBS Bendigo,Australia freeway.apana.org.au (21:1/109)
  • From Bbsing.Bbs@21:1/138 to Vk3jed on Thu Aug 15 16:48:00 2019
    Vk3jed wrote to Bbsing.Bbs <=-

    I haven't seen an interface for GPG available for Multimail yet.

    Me either, and this is what makes things a little more difficult to use all the time. In fact its that level of difficulty and the fact that
    the huge mail providers don't want to make encryption easy for their users, that prevent everyone from adopting it now.

    It just needs to be a wrapper for the editor function to make all the
    GPG functions available. Or alternatively, work with the Multimail developer to have GPG support integrated in, in a similar manner to the Enigmail plugin for Tnunderbird.

    I've never even spoke/emailed/messaged with a developer before.

    There is a first for everything.

    BBSING

    --- MultiMail/Linux v0.49
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Vk3jed@21:1/109 to Bbsing.Bbs on Fri Aug 16 20:05:00 2019
    On 08-15-19 16:48, Bbsing.Bbs wrote to Vk3jed <=-

    I've never even spoke/emailed/messaged with a developer before.

    I have, it can be very productive if you're both on the same wavelength.


    ... To be, or not to be, those are the parameters.
    === MultiMail/Win v0.51
    --- SBBSecho 3.03-Linux
    * Origin: Freeway BBS Bendigo,Australia freeway.apana.org.au (21:1/109)
  • From Bbsing.Bbs@21:1/138 to Avon on Thu Mar 24 17:01:21 2022
    Re: Re: Decoding this...
    By: Avon to Bbsing.Bbs on Thu Aug 08 2019 12:52 pm

    On 02 Aug 2019 at 11:48p, Bbsing.Bbs pondered and said...

    VK, you doing anything with encryption these days?

    I'm looking to do some more in this space in the coming months... have a few ideas we might be able to test out. When I do, can
    pick your brains about them? :)

    Best, Paul
    Of course, but my problem is I don't get on BBSs consistently.
    Have you done any more work on encryption?
    --- SBBSecho 3.15-Linux
    * Origin: Electronic Warfare BBS | bbs.ewbbs.net | CBNET HQ (21:1/138)
  • From Death2U@21:1/121 to Bbsing.Bbs on Sun Mar 26 12:48:24 2023
    I love encryption it's actually all I do I wrote a custom key that seems to keep the other guys out of my stuff. Apparently a simple cipher like aes-ecb w my key is good enough. It uses a custom algorithm to encrypt.

    --- ENiGMA 1/2 v0.0.14-beta (linux; x64; 16.16.0)
    * Origin: Xibalba -+- xibalba.l33t.codes:44510 (21:1/121)