DataMuseum.dk

Presents historical artifacts from the history of:

ICL Comet 32

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about ICL Comet 32

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download

⟦b0b65bfc8⟧ TextFile

    Length: 1091 (0x443)
    Types: TextFile
    Notes: UNIX file
    Names: »xsend.1«

Derivation

└─⟦26887b7e0⟧ Bits:30009717 Comet 32 harddisk image
    └─⟦28c352965⟧ »/a« UNIX Filesystem
        └─⟦this⟧ »usr/man/man1/xsend.1« 

TextFile

.ig
	@(#)xsend.1	2.1	7/1/84
	@(#)Copyright (C) 1983 by National Semiconductor Corp.
..
.TH XSEND 1
.SH NAME
xsend, xget, enroll \- secret mail
.SH SYNOPSIS
.B xsend
person
.br
.B xget
.br
.B enroll
.SH DESCRIPTION
These commands implement a secure communication
channel;
it is like
.IR mail (1),
but no one can read the messages except the intended recipient.
The method embodies a public-key cryptosystem using knapsacks.
.PP
To receive messages, use
.IR enroll ;
it asks you for a password that you must subsequently quote
in order to receive secret mail.
.PP
To receive secret mail,
use
.IR xget .
It asks for your password, then gives you the messages.
.PP
To send secret mail, use
.IR xsend
in the same manner as the ordinary mail command.
(However, it will accept only one target).
A message announcing the receipt of secret mail is also sent
by ordinary mail.
.SH FILES
/usr/spool/secretmail/*.key: keys
/usr/spool/secretmail/*.[0-9]: messages
.SH SEE ALSO
mail (1)
.SH BUGS
It should be integrated with ordinary mail.
The announcement of secret mail makes traffic analysis possible.