I actually thought Shannon's nym was a Claude Shannon reference!But anyway, yes, one time pads are very cool indeed. Difficult to implement in practice perhaps, but with rigorous application of common sense it is possible for people to communicate in such a way that no agency on earth can discover the content of a message. There are ways to break OTPs with faulty implementations, issues of distributing the private key etc but there is no better way to ruin a cryptanalyst's day than an astute user of a OTP. It's just easier to use rubberhose cryptanalysis.In short for those interested in learning more, a OTP is a situation in which the key length is as long as your message. If the key is completely random and the encrypter and decrypter are the only ones with a copy of this key, then the message will be unbreakable. That is the extent of my knowledge on the issue, but I will ferret out more info, squirrel away useful nuggets and back condense them into a tutorial because I think OTP tutorial would be a very nice thing to write up here, I will add it to my list of future projects. But don't let that stop anybody else wanting to investigate OTP or make an alternative tutorial, the more the merrier :)P.S. I will be replying to my PGP Club questions soon, I've had an especially busy week :)