1994-12-28 - Re: Why I have a 512 bit PGP key

Header Data

From: “Perry E. Metzger” <perry@imsi.com>
To: eric@remailer.net (Eric Hughes)
Message Hash: 7002e542fea3d5cdaf26991ff831716de15c58cdd48e7e7345da0b54a35d925d
Message ID: <9412280307.AA03703@snark.imsi.com>
Reply To: <199412280240.SAA02061@largo.remailer.net>
UTC Datetime: 1994-12-28 03:07:54 UTC
Raw Date: Tue, 27 Dec 94 19:07:54 PST

Raw message

From: "Perry E. Metzger" <perry@imsi.com>
Date: Tue, 27 Dec 94 19:07:54 PST
To: eric@remailer.net (Eric Hughes)
Subject: Re: Why I have a 512 bit PGP key
In-Reply-To: <199412280240.SAA02061@largo.remailer.net>
Message-ID: <9412280307.AA03703@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain



Eric Hughes says:
>    From: "Ian Farquhar" <ianf@sydney.sgi.com>
> 
> re: personal account tripwire
> 
>    The problem is that although you can protect the data file of
>    hashes (by using a pass phrase to encrypt it), protecting the
>    binary which does the checking is rather more difficult.
> 
> Why not recompile the binary?  All it needs to be is something like
> md5.c.

Read Ken Thompson's Turing Award lecture for why that isn't
sufficient. Its quite amusing.

Lets face it -- if you are truly paranoid, you have to carry your
machine around with you at all times and chain it to you.

Its all a question of threat model. For national security type attacks
nothing less than "chain machine to wrist" will do. For stopping a
casual attack, much less is needed. Its all in the threat model...

Perry





Thread