- - p u b l i c i t y - -
ttp.GIF (2105bytes)
                        The Practice of Net Democracy

Encryption is your only weapon when you're living in an armed camp. Get yours now!!!

Your Personal Freedom can be Protected by Creative Cryptography Tools

as creative as
Art Cryptography®

as creative as
Art Encryption for Personal Privacity®

All Art CryptographicSoftware from Technologies ToThe People® can be freely exported

I have no reason to suppose that he, who would take away my Liberty, would not, when he had me in his Power, take away everything else.
-- Thomas Jefferson, Slaveowner & President
Welcome to Art Cryptography®! With Art Encryption for Personal Privacy®, you can easily and securely protect the privacy of your e-mail messages and file attachments by encrypting them so that only the intended recipients can read them. You can also digitally sign messages and files, which ensures their authenticity. A signed messages verifies that the information in it has not been tampered with in any way.










RIZHOME PUBLIC KEY pub 1024/62D1BCD1 1996/03/27 rizhome info@rhizome.org -------BEGIN Art Cryptography® PUBLIC KEY BLOCK------- Version:Art Encryption® for Personal Privacy 1.0.2 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' 4OD8DDDDDDDDD%%%DD8O''''''''''''''''''''''''''''''''''''''''''''' S%P%I%R%A%LD%%J%EDTDTDYDDDDD8'''''''''''''''''''''''''''''''''''' R%O%B%E%RDTD%S%MDI%TDHDS8ODNDDDDDDDDDDD8DC''''''''''''''''''''''' G$R%E%A%T%S%A%L%T%L%A%KDEDD%D%%%%%DDDDD%%%%%D'''''''''''''''''''' U%T%A$H%1%9%7%0%%%%%%%%%%%%%%%%%%%%%DDD%%%%%%%DDD'''''''''''''''' %%%%$%%%%%%%%%%D%D%%D%%%%D%%%D%%%%%%%%%%%%%%%%%%%%%%%DD;''''''''' %$%%%%%%%%%%%%%%%DDDD88DDDDDDDDDDDDDDD8DDDD%DDD%%%%%%D%D%D%$$$$D; %%%%%%%%%%%DDDD%DD%%D%%DDD%%D%C%%D%%D%%%%$%$$$%%%%%%%%%%$$$$$$$$% %%%%%%%%%%%$$$$$$$$$$$$$$$$8OODD$%%D%%%%%$$$$$$$$$$$$$$$$$$-~'XC' D%%DDDDDD%D$$$$$$$$$$$$$$$$$$$%C%%CC111~~-;:''''''''''''''''''''' :'''''''''''''''''''''$$$$$$$$-;;;;::::;:'''''''''''''''''''''''' .'.''''''''''''''''$$$$$$$4~-::::::..'''''''''''''''''''''''''''' ::.''''''''''''$$$$$$11~-~~;;;:::::..'''''''''''.'''''.''''''''' :::;:;:;;1D-$$$$$$$+II4D$$$$$$$$$$$$$$$$$$$$$$$$$:-:;-;;-;;:::.'. ---I~~-X4$$$$$$$CXXX$$$$$$$8O$$$$$$$$$$$C:$$$$$$$$$$$S1++1~II-;;; I+11+$$$$$$$$%4==%$$$$$4=I$$$$$$$$$$$$$$$$$$$C::::$$$$$$$D1+++I-- 1+14$$$$$$$$=I~IX$$$$$S+11D$$$$$$$$=-;;;;-4$$$$DC;::;=$$$$$$$%+11 ;X=$$$$$$$X1~;-IX%$$$$$$+~--X$$$$$$$I;;--~%$$$$$8~;;;;-I%$$$$$$S+ $$$$$$$$$4X+~--~+DD$$$$$$$$$DDD88C8D%$$$$$$$$$$S+-;::;-~X$$$$$$%8 $$$$$$$$$%4X=+I~-~I+X$$$$$$$$$$$$$$$$$$$$$$$%S1--;;;;;~IS$$$$$$$D $$+$+DDO$$$$$OXX+I~~-~I1==+4S4D$8%D8D4SCC=1I-;;;;;;--=$$$$$$$$$$O X$$$O$$$$$$$$$$$$$$$DSC=11+1111III1III1++=XOSS8DDD$$$$$$$$$$$$$%O 14$$$$$$$$ID$8$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$8$$$$O$$$$$$$$$%DDDC I+C4O$$$$$$$$$$D4%4SX81$1$18~$$4D$$$$??;DO%$$%%$$%$$$$$$$$$%8844X I+XCC4CC4$$$$$$$$$$$$$$$$$$$$O$$$$$$$$$$$$$$$$$$$$$$$$$$O44SSC=+1 II1+11+++1111==XCD$$$$$$$$$$$$$$$$$$$$$$$$$$%%%%%%%D4XX=X+++++++C X+11IIIIIII11IIIIII1I~~II1II+1OI1I+XXCCCXX=+====++I11X=+11=+X++11 XX=+111II11I1II~~~-~~~~~~--:-~~111+XX44SCCCCX==++1IIII=+XXXCCCXCC ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' --------END Art Cryptography® PUBLIC KEY BLOCK--------


LOgottp.gif (1566bytes)

© 1997 Technologies To The People, inc. All rights reserved. Technologies To The People is registered trademark. Reproduction in whole or in part without written permision is prohibited. All other trademarks or registered trademarks are property of their respective owners. Other product and company names mentioned herein may be the trademarks of their respective owners.

Technologies To The People® Defining the Art of Cryptography