>1. Encryption-You have a user friendly screen to select the drive, directory
>and files that you want to encrypt. Chosen files for encryption are
>grouped together and compiled into a single executable file with an assigned
>password you enter. There is no limitation on the password size. Overseas
>distribution of the encrypted files is not restricted. File encryption
>often takes less then ten seconds.
Give me a break. Why is is that everyone and their uncle wants to do
individual file encryption ? I have and use ViaCrypt's PGP for that and
the Business Edition has a lot more advantages.
>2. Decryption- Allows you to select the drive, directory and file you want
>to decrypt. The password is requested once you select the encrypted file.
>Decryption is performed in Windows or Windows 95 with the freely distributed
> decryption module. Decryption module is sent to each receiver with no
>licensing requirement. Decryption of the executable file may also be
>performed at the DOS prompt with no additional software.
Understand. This is a way to end-run ITAR. But ITAR is going away so why
Now why do I say it is going away ? Look at ITAR section XIII (b) exclusions
and the MasterCard/Visa/Microsoft/Netscape alliance (exercise is left to
the student 8*). If you want evidence of the size of the market, look at
AT&T's waiver of the traditional $50 cardholder liability on Wordnet.
Further corporations and big users do not need to encrypt individual files
for the most part, they need to encrypt channels (to avoid volume analysis)
between their sites and the entire notebook/computer, not some files. Heck,
corporate users have trouble understanding when to run and not to run
macros in WORD documents and you expect them to be dilligent about what
files to encrypt before mailing ?
Just as we had to move protection from the workstation/node level to the
network/subnet (e.g. firewalls), transaction protection must also be moved.
I am seeing a lot of whole keys on blue backgrounds these days...