Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > REVIEW: "PGP & GPG: Email for the Practical Paranoid", Michael W. Lucas

Reply
Thread Tools

REVIEW: "PGP & GPG: Email for the Practical Paranoid", Michael W. Lucas

 
 
Rob Slade, doting grandpa of Ryan and Trevor
Guest
Posts: n/a
 
      10-09-2006
BKPGPGPG.RVW 20060823

"PGP & GPG: Email for the Practical Paranoid", Michael W. Lucas, 2006,
1-59327-071-2, U$24.95/C$32.95
%A Michael W. Lucas http://www.velocityreviews.com/forums/(E-Mail Removed)
%C 555 De Haro Street, Suite 250, San Francisco, CA 94107
%D 2006
%G 1-59327-071-2
%I No Starch Press
%O U$24.95/C$32.95 415-863-9900 fax 415-863-9950 (E-Mail Removed)
%O http://www.amazon.com/exec/obidos/AS...bsladesinterne
http://www.amazon.co.uk/exec/obidos/...bsladesinte-21
%O http://www.amazon.ca/exec/obidos/ASI...bsladesin03-20
%O Audience n- Tech 1 Writing 2 (see revfaq.htm for explanation)
%P 196 p.
%T "PGP & GPG: Email for the Practical Paranoid"

The introduction states that while the book does cover foundational
encryption concepts, it is primarily intended to explain the
appropriate use of the PGP (Pretty Good Privacy) and GPG tools. This
preamble also provides a history and description of PGP, OpenPGP, and
GnuPG. The rudimentary outline is good, but does have some errors: an
ITAR (International Traffic in Arms Regulations) offence would be a
criminal (rather than civil) matter so the US government never did
launch a lawsuit against software author Phil Zimmermann (although
other lawsuits were launched surrounding the program), and the program
was produced before the book of the source code was published. (Lucas
also retails the myth that the NSA has a secret computer that can
crack the strongest of encryption algorithms: to those who truly do
understand encryption technology the suggestion is patently absurd.)

Chapter one outlines the basics of cryptography, but adds more errors:
for example, a code doesn't relate to concealment, and substitution is
not the only form of ciphering. While the explanations are sometimes
far from clear, generally the ideas are presented reasonably, although
in a simplistic manner. (Here and at other places in the book, Lucas
attempts to inject the occasional note of levity. As with similar
attempts by other authors, these jokes will not help the reader to
understand or remember of the material. However, at least Lucas keeps
the quips to a minimum, and they aren't too annoying.) Elementary
components of OpenPGP are related in chapter two. Installation
instructions for PGP Desktop are provided in chapter three, along with
additional suggestions and information about locations for keys.
These are useful for those with an intermediate or advanced level of
familiarity with Windows, but there is insufficient detail or
explanation provided for novice users, who appear to be the most
appropriate target audience for thia book. Chapter four deals with
the installation of GnuPG and the Windows Privacy Tray (WinPT)
graphical front end, and more details are provided for this form,
although the definition is still weak. Specific operations and
activities regarding the building and use of the Web of Trust are
outlined in chapter five, but the implications and underlying concepts
are not explained well even though some of the more esoteric
ramifications are mentioned. Key management dialogue boxes are
described for PGP in chapter six, and GnuPG in seven. Chapter eight
is an introduction to the idea of (and some of the problems with)
using OpenPGP with email. Various settings for PGP and email are in
chapter nine. Installation of plugins for GnuPG and the Outlook,
Outlook Express, and Thunderbird mailers is described in chapter ten.
Various warnings about using PGP and GnuPG are sounded in chapter
eleven. Most are reasonable, but some betray a lack of background
(SHA-1 is more susceptible to the birthday attack than to forgery).

This could be a helpful guide if you are new to encryption and wish to
install and use PGP Desktop or GnuPG. However, note that the
background information is limited, and sometimes inaccurate. For most
users this will not be an issue. More importantly, beyond the basic
operations of the programs there is little in the way of advice on the
finer points of "appropriate" use of encryption services. A handy
guide to obtaining and installing the software, but, beyond that, you
are pretty much on your own.

copyright Robert M. Slade, 2006 BKPGPGPG.RVW 20060823

--
======================
(E-Mail Removed) (E-Mail Removed) (E-Mail Removed)
"Dictionary of Information Security," Syngress 1597491152
http://www.syngress.com/catalog/?pid=4150
Dictionary of Info Sec www.amazon.com/exec/obidos/ASIN/1597491152
============= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
CISSP refs: [Base URL]mnbksccd.htm
Book reviews: [Base URL]mnbk.htm
Review mailing list: send mail to (E-Mail Removed)
or (E-Mail Removed)

 
Reply With Quote
 
 
 
Reply

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
OT Lucas Tam has been shut down aka JP Digital Photography 0 04-16-2004 01:01 AM
Re: Lucas: Cake farting sirtonysmama@hanmail.com Digital Photography 2 12-12-2003 09:16 AM
Why DID lucas make Greedo shoot first anyway? Metlhd3138 DVD Video 31 11-15-2003 09:55 PM
why is George Lucas such a buttmunch? Grand Inquisitor DVD Video 64 10-07-2003 05:43 AM



Advertisments