New Cryptor Bundle version 2.1 with Source code available. This is a bug fix and feature enhancement release. I have uploaded source code and binaries which run on NextStep 3.3 and OpenStep 4.2 Next/Intel to ftp://ftp.next.peak.org, with the filename Cryptor.2.1.bundle.NI.s.tar.gz. See the new arrivals directory listings for where it will eventually land. Also included in the package is a patchfile which allows PGP version 5.0 to compile on NextStep3.3 or OpenStep 4.2. This is a new implementation of the Cryptor bundle for NextStep/OpenStep Next/Intel Mail.app. This bundle uses PGP version 5.0 as the encryption engine. PGP is not included due to United States export restrictions. Once you do get PGP from one of the European sources, you can patch the PGP source to allow it to compile on NextStep/OpenStep with the enclosed file pgp50i.patch. This version of Cryptor.bundle will do most key management with drag-and-drop icons. You can add keys to your keyring by dragging a key-file icon into the Key Well, and you can send keys to others by dragging a key icon from the Key Well to your mail message. This version of Cryptor.bundle also does a complete check of your PGP installation to insure you have installed and configured pgp correctly. Any errors in your pgp installation will be detected, and an informative panel decribing the problem and suggesting a solution will appear. This should alleviate many people's frustrations in getting PGP encryption running. Caveats: o Cryptor.bundle will only encrypt PlainMail or NextMail messages. MIME messages cannot be encrypted with Cryptor. o Encrypted messages are sent in NextMail format. Even encrypted PlainText messages are sent in NextMail format. Messages encrypted with Cryptor.bundle will not be easily un-encrypted by anyone without NextMail capability. It's not impossible, but it requires some skill with command-line tools. [Briefly, a NextMail message is simply a uuencoded gzipped tar file (got that?). You can get to the pgp message by uudecoding, uncompressing, and de-tarring the NextMail body. Then you can use pgp to decrypt. Like I said, not impossible, but cumbersome.] Howard Cole USU Research Foundation Space Dynamics Lab edx@cc.usu.edu