Feeds

PGP creator Zimmerman leaves Network Associates

Differences over publishing source code for PGP

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Encryption guru Phil Zimmerman has left Network Associates citing differences with the security giant about publishing the full source code for the latest version of the widely used encryption program, PGP.

Zimmerman, the creator of PGP (Pretty Good Privacy), is leaving Network Associates (NAI) after three years as a senior fellow to work with security firm Hush Communications in developing encryption products based on the OpenPGP standard. He is also launching the OpenPGP Consortium to further interoperability of different vendors' implementations of the standard, embodied in IETF RFC 2440.

In a message to the encryption community at large, Zimmerman reiterated his faith that there were no "back doors" in PGP, the source code and trademark for which is owned by Network Associates.

"Let me assure all PGP users that all versions of PGP produced by NAI, and PGP Security, a division of NAI, up to and including the current (January 2001) release, PGP 7.0.3, are free of back doors," said Zimmerman.

Zimmerman explained he was leaving because Network Associates "has developed a different vision for PGP's future" and it was time for him to move onto other projects that fitted his objectives for enabling personal privacy.

"New senior management assumed control of PGP Security in the final months of 2000, and decided to reduce how much PGP source code they would publish. If NAI ever publishes the complete PGP 7.0.3 source code, I am confident that the public will be able to see that there are still no back doors," he said.

Zimmerman's decision to leave Network Association has been accepted with regret by the encryption community, who respect his integrity and see him as a guardian of the integrity of the product. However his decision isn't entirely surprising because the free-spirited Zimmerman always seemed out of place amongst the corporate suits and ex-NSA (National Security Agency) staffers who work for Network Associates.

External links

Statement from Phil Zimmerman
OpenPGP group

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.