31. The council in San Francisco is adding an encryption program, too. 32. The data encryption program is called PGP, for Pretty Good Privacy, which is based on the same RSA algorithms used by Commercenet. 33. The encryption programs allow callers to scramble information so that only the recipients can decode it. 34. The Cybercash system is similar to an encryption program approved previously for the transfer of financial data among international banks. 35. The White House is opposed to pending legislation that would substantially ease current restrictions on overseas sales of encryption programs. 36. There are also encryption programs such as Zero-Knowledge Systems. 37. These devices would bypass encryption programs that can be used to scramble data. 38. Using encryption programs, people make credit card purchases over the Internet, or transmit personal information without fear that the data will fall into the wrong hands. 39. PGP is a strong, free encryption program that can be used for e-mail or individual files. 40. Hackers have the time and the enthusiasm to work out how individual encryption programs work by reverse engineering it. |
|