Feeds

PGP creator Zimmerman leaves Network Associates

Differences over publishing source code for PGP

  • alert
  • submit to reddit

Seven Steps to Software Security

Encryption guru Phil Zimmerman has left Network Associates citing differences with the security giant about publishing the full source code for the latest version of the widely used encryption program, PGP.

Zimmerman, the creator of PGP (Pretty Good Privacy), is leaving Network Associates (NAI) after three years as a senior fellow to work with security firm Hush Communications in developing encryption products based on the OpenPGP standard. He is also launching the OpenPGP Consortium to further interoperability of different vendors' implementations of the standard, embodied in IETF RFC 2440.

In a message to the encryption community at large, Zimmerman reiterated his faith that there were no "back doors" in PGP, the source code and trademark for which is owned by Network Associates.

"Let me assure all PGP users that all versions of PGP produced by NAI, and PGP Security, a division of NAI, up to and including the current (January 2001) release, PGP 7.0.3, are free of back doors," said Zimmerman.

Zimmerman explained he was leaving because Network Associates "has developed a different vision for PGP's future" and it was time for him to move onto other projects that fitted his objectives for enabling personal privacy.

"New senior management assumed control of PGP Security in the final months of 2000, and decided to reduce how much PGP source code they would publish. If NAI ever publishes the complete PGP 7.0.3 source code, I am confident that the public will be able to see that there are still no back doors," he said.

Zimmerman's decision to leave Network Association has been accepted with regret by the encryption community, who respect his integrity and see him as a guardian of the integrity of the product. However his decision isn't entirely surprising because the free-spirited Zimmerman always seemed out of place amongst the corporate suits and ex-NSA (National Security Agency) staffers who work for Network Associates.

External links

Statement from Phil Zimmerman
OpenPGP group

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.