VIMI Secure Data Systems

The Foremost Secured Untraceable Data Network Using Military Grade Encryption.

PGP Encryption
German Flag Spanish Flag French Flag Italian Flag Portuguese Flag Japanese Flag Korean Flag Chinese Flag British Flag

We provide PGP tutorial and installation…..for more details pls. contact us.

A short background about this military strength encryption and the most tested software in the world.

What is PGP?
PGP (also called “Pretty Good Privacy”) is a computer program that encrypts (scrambles) and decrypts (unscrambles) data. For example, PGP can encrypt “Andre” so that it reads
“457mRT%$354.” Your computer can decrypt this garble back into “Andre” if you have PGP.

Who created PGP?
Philip Zimmermann wrote the initial program. Phil, a hero to many pro-privacy activists, worked as a computer security consultant in Boulder, Colorado during the original days of PGP. Other programmers around the globe created subsequent PGP versions and/or shells. Subsequent versions of PGP were created by a California based corporation called Network Associates, which bought a previous company, co-founded by Zimmerman, called PGP, Inc. Corporate mergers are so commonplace in America. Who knows who will control PGP by the time you read this?

Who uses PGP encryption?
People who value privacy use PGP. Politicians running election campaigns, taxpayers storing IRS records, therapists protecting clients’ files, entrepreneurs guarding trade secrets, journalists protecting their sources, and people seeking romance are a few of the law abiding citizens who use PGP to keep their computer files and their e-mail confidential.

Businesses also use PGP. Suppose you’re a corporate manager and you need to e-mail an employee about his job performance. You may be required by law to keep this e-mail confidential. Suppose you’re a saleswoman, and you must communicate over public computer networks with a branch office about your customer list. You may be compelled by your company and the law to keep this list confidential. These are a few reasons why businesses use encryption to protect their customers, their employees, and themselves.

PGP also helps secure financial transactions. For example, the Electronic Frontier Foundations uses PGP to encrypt members’ charge account numbers, so that members can pay dues via e-mail.

Thomas G. Donlan, an editor at Barron’s [a financial publication related to The Wall Street Journal], wrote a full-page editorial in the April 25, 1994 Barron’s entitled “Privacy and Security: Computer Technology Opens Secrets, And Closes Them.” Mr. Donlan wrote, in part:

“Without security, the Internet is little more than the world’s biggest bulletin board. With security, it could become the information supermarket of the world. [Encryption] lets people and banks feel secure putting their credit-card numbers on the public network. Although it still seems that computers created an age of snoopery, the age of privacy is at hand.”

On a lighter note, a college student wrote me the following:

“I had a part-time job at a dry cleaner. One day I returned a diamond ring that I’d found in a man’s coat pocket to his wife. Unfortunately, it was NOT her ring! It belonged to her husband’s girlfriend. His wife was furious and divorced her husband over this incident. My boss told me: ‘Return jewelry ONLY to the person whose clothes you found it in, and NEVER return underwear that you find in pockets!’ Until that moment, I thought my boss was a finicky woman. But she taught me the need for PGP.”

Privacy, discretion, confidentiality, and prudence are hallmarks of civilization.

I’ve heard police say that encryption should be outlawed because criminals use it to avoid detection. Is this true?
The next time you hear someone say this, ask him if he wants to outlaw the likes of Thomas Jefferson, the “Father of American Cryptography,” who wrote the American Declaration of Independence.

Many governments, corporations, and law enforcement agencies use encryption to hide their operations. Yes, a few criminals also use encryption. Criminals are more likely to use cars, gloves, and ski-masks to evade capture.

PGP is “encryption for the masses.” It gives average law abiding citizens a few of the privacy rights which governments and corporations insist that they need for themselves.

How does PGP work?
PGP is a type of “public key cryptography.” When you start using PGP, the program generates two “keys” that belong uniquely to you. Think of these keys as computer counterparts of the keys in your pocket. One PGP key is SECRET and stays in your computer. The other key is PUBLIC. You give this second key to your correspondents. Here is a sample PUBLIC KEY:

—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: 5.0

mQCNAi44C30AAAEEAL1r6ByIvuSAvOKIk9ze9yCK+ZPPbRZrpXIRFBbe+U8dGPMb
9XdJS4L/cy1fXr9R9j4EfFsK/rgHV6i2rE83LjOrmsDPRPSaizz+EQTIZi4AN99j
iBomfLLZyUzmHMoUoE4shrYgOnkc0u101ikhieAFje77j/F3596pT6nCx/9/AAUR
tCRBbmRyZSBCYWNhcmQgPGFiYWNhcmRAd2VsbC5zZi5jYS51cz6JAFUCBRAuOA6O
7zYZz1mqos8BAXr9AgCxCu8CwGZRdpfSs65r6mb4MccXvvfxO4TmPi1DKQj2FYHY
jwYONk8vzA7XnE5aJmk5J/dChdvfIU7NvVifV6AF
=GQv9
—–END PGP PUBLIC KEY BLOCK—–

Suppose the PUBLIC KEY listed above belongs to you and that you e-mail it to me. I can store your PUBLIC KEY in my PGP program and use your PUBLIC KEY to encrypt a message that only you can read. One beauty of PGP is that you can advertise your PUBLIC KEY the same way that you can give out your telephone number. If I have your telephone number, I can call your telephone; however, I cannot answer your telephone. Similarly, if I have your PUBLIC KEY, I can send you mail; however, I cannot read your mail. This PUBLIC KEY concept might sound a bit mysterious at first. However, it becomes very clear when you play with PGP for a while.

How safe is PGP?
For many years, the PGP computer code has been published so that security experts can examine it for “back doors” (hidden ways to break into PGP messages).

Perhaps your government or your mother-in-law can “break” PGP messages by using supercomputers and\or pure brilliance. I have no way of knowing. Three facts are certain. First, top-rate civilian cryptographers and computer experts have tried unsuccessfully to break PGP. Second, whoever proves that he or she can unravel PGP will earn quick fame in crypto circles. He or she will be applauded at banquets and attract grant money. Third, PGP’s most knowledgeable users around the world will broadcast this news at once.”

Almost daily, someone posts a notice such as “PGP Broken by Omaha Teenager.” Take these claims with a grain of salt. The crypto world attracts its share of paranoids, provocateurs, and UFO aliens. To date, nobody has publicly demonstrated the skill to outsmart or outmuscle PGP

Is PGP legal in the United States?
Yes. However, it is ILLEGAL to export PGP out of the United States without the proper government approval. Do not even think of doing so! To communicate with friends in, say, England, have your friends get PGP from sources outside the United States.

Is PGP legal outside the United States?
PGP’s legality varies from country to country. Plus, laws constantly change around the globe. You’ll have to check the laws where you live.

What is a PGP digital signature?
Suppose I signed this FAQ with my PGP “digital signature”. This would allow persons who have PGP and my PUBLIC KEY to verify that 1) I, Andre Bacard, (not a Sports Illustrated superstar pretending to be me!) wrote this document, and 2) Nobody has altered this text since I signed it. PGP signatures might be helpful for signing contracts, transferring money, and verifying a person’s identity.

How difficult is it to learn PGP?
PGP is easier to use than, say, a word processing program. The latest Windows versions allow you to encrypt and decrypt files and e-mail messages with a simple mouse click..

Is PGP available for my machine?
Versions are available for DOS and Windows, as well as various Unixes, Macintosh, Amiga, Atari ST, and OS/2 systems. Many persons are working to expand PGP’s usability. Read the Usenet news group for the latest developments.

Philip Zimmermann
Creator of PGP

Background

Philip R. Zimmermann is the creator of Pretty Good Privacy. For that, he was the target of a three-year criminal investigation, because the government held that US export restrictions for cryptographic software were violated when PGP spread all around the world following its 1991 publication as freeware. Despite the lack of funding, the lack of any paid staff, the lack of a company to stand behind it, and despite government persecution, PGP nonetheless became the most widely used email encryption software in the world. After the government dropped its case in early 1996, Zimmermann founded PGP Inc. That company was acquired by Network Associates Inc (NAI) in December 1997, where he stayed on for three years as Senior Fellow. In August 2002 PGP was acquired from NAI by a new company called PGP Corporation, where Zimmermann now serves as special advisor and consultant. Zimmermann currently is consulting for a number of companies and industry organizations on matters cryptographic, and is also a Fellow at the Stanford Law School’s Center for Internet and Society.

Before founding PGP Inc, Zimmermann was a software engineer with more than 20 years of experience, specializing in cryptography and data security, data communications, and real-time embedded systems. His interest in the political side of cryptography grew out of his background in military policy issues.

He has received numerous technical and humanitarian awards for his pioneering work in cryptography. In 2001 Zimmermann was inducted into the CRN Industry Hall of Fame. In 2000 InfoWorld named him one of the Top 10 Innovators in E-business. In 1999 he received the Louis Brandeis Award from Privacy International, in 1998 a Lifetime Achievement Award from Secure Computing Magazine, and in 1996 the Norbert Wiener Award from Computer Professionals for Social Responsibility for promoting the responsible use of technology. He also received the 1995 Chrysler Award for Innovation in Design, the 1995 Pioneer Award from the Electronic Frontier Foundation, the 1996 PC Week IT Excellence Award, and the 1996 Network Computing Well-Connected Award for “Best Security Product.” PGP was selected by Information Week as one of the Top 10 Most Important Products of 1994. Time Magazine also named Zimmermann one of the “Net 50″, the 50 most influential people on the Internet in 1995.

In addition to the awards for versions of PGP developed before Zimmermann started a company, subsequent versions of PGP as refined by the company’s engineering team continued to be recognized with many more industry awards.

Zimmermann received his bachelor’s degree in computer science from Florida Atlantic University in 1978. He is a member of the International Association of Cryptologic Research, the Association for Computing Machinery, and the League for Programming Freedom. He is Chairman of the OpenPGP Alliance, serves on the Boards of Directors for Computer Professionals for Social Responsibility and Veridis, and is on the Advisory Boards for Anonymizer.com, Hush Communications, and Qualys.

Zimmermann can be reached by email at prz@mit.edu