Will you please make up your mind already? First you said:
And then you said:
So which is it? Does Pangolin need to spend a lot of money to get a decent encryption system, or can they go it alone (for free) by using public key cryptography?
Bottom line: I'm sure they paid someone a good chunk of change for the encryption system they use on the LD-2000, because I asked Bill about it specifically. As to whether it's based on public-key cryptography or some other method I can't say - mostly because he didn't offer any details and I didn't ask for them. But the fact remains that the secure file format is still secure.
Adam
I'm sure Bill invested and spends a lot of money on the development of pangolin software and the security system works great.
I dont know why this topic got off track so ensanly quick, but i'd apreciate it if we go back into the reason why I created this topic.
It's a really great project and i'm very excited myself about the decision I took and also very happy that I took it.
I expected rather a bit more comments that actually showed curiousity in the project itself and also more positive comments then all the immense amount of criticising comments about pangolin or me.
Buffo your very very right with your responses and you know what you are talking about
Best regards,
Pieter
Last edited by masterpj; 10-20-2011 at 05:17.
PJ, I hate to burst your bubble, but I first saw a QM series product used as a remote device in a server some 10 years ago. QMs have ended up in some unique uses.
Steve
If you consider a US LATA interexchange carrier's computer center a data center, which it is, yes. I actually watched the president of said company telnet into the server and pull me up some frames to Canada when the server was in the US.
Steve
There are two kinds of good encryption: there's the open kind, that's secure because it is well known and has been inspected thoroughly, and there's the very expensive closed kind that even the military can't really afford (and, indeed, has turned out to be flawed on more than one occasion).
The thing is, to prove a cryptosystem costs a lot of money- far more than Pangolin is ever going to spend on it- and you might still find a flaw after all that. I mean, DES turned out to be flawed, after all. You can either use a standard system in the knowledge that everyone else is using it and therefore it's had a lot of eyes on it, or you can use a closed system and hope that nobody tries looking too hard at it.
Or you can hire a cryptology expert to implement a standard system in your custom hardware. After all, even with the best standards in use, if you screw up the implementation, you're still compromised. Thus it pays to hire an expert even if you are using a standard system.
While I can't say for certain, I strongly suspect that the people Bill hired to do the encryption probably did exactly this. And as I said before, the fact that it's withstood the test of time suggests that they did indeed do it right.
Adam