1994-12-23 - reading someone’s files

Header Data

From: perry@imsi.com (Perry E. Metzger)
To: cypherpunks@toad.com
Message Hash: 53487ef7ccefbdceea9d0ae50e5f55da10d527fa761cb108a7f64dd4a8ee86ec
Message ID: <9412232026.AA22580@webster.imsi.com>
Reply To: N/A
UTC Datetime: 1994-12-23 20:26:35 UTC
Raw Date: Fri, 23 Dec 94 12:26:35 PST

Raw message

From: perry@imsi.com (Perry E. Metzger)
Date: Fri, 23 Dec 94 12:26:35 PST
To: cypherpunks@toad.com
Subject: reading someone's files
Message-ID: <9412232026.AA22580@webster.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain


Re: The Norton Encryption thread

I'm suprised that no one has given the obvious answers on this
topic. If you have physical access to someone's machine, it is trivial
to find out what their encryption keys are. After all, the victim
types into the machine regularly -- recording all their keystrokes is
not a difficult matter at all.

Now, I agree with all the people who note that violating people's
privacy is wrong and that this individual should get a new girlfriend
rather than learning how to hack her files, but from a technical point
of view there is no challenge here at all.


Perry





Thread