1996-01-30 - Re: FV’s Borenstein discovers keystroke capture programs! (pictures at 11!)

Header Data

From: Nathaniel Borenstein <nsb@nsb.fv.com>
To: “timo@microsoft.com>
Message Hash: dc77f3ca54392bb678fe0795db15b41f66d9b8ebe991b0def5358486abcbe681
Message ID: <kl3Wc7OMc50eRIr810@nsb.fv.com>
Reply To: <c=US%a=_%p=msft%l=RED-66-MSG960129190324HH007C00@red-02-imc.itg.microsoft.com>
UTC Datetime: 1996-01-30 15:26:27 UTC
Raw Date: Tue, 30 Jan 1996 23:26:27 +0800

Raw message

From: Nathaniel Borenstein <nsb@nsb.fv.com>
Date: Tue, 30 Jan 1996 23:26:27 +0800
To: "timo@microsoft.com>
Subject: Re: FV's Borenstein discovers keystroke capture programs! (pictures at 11!)
In-Reply-To: <c=US%a=_%p=msft%l=RED-66-MSG960129190324HH007C00@red-02-imc.itg.microsoft.com>
Message-ID: <kl3Wc7OMc50eRIr810@nsb.fv.com>
MIME-Version: 1.0
Content-Type: text/plain


>  But I just can't believe that he thinks that
the telephone is more secure on average than a keyboard.

We have a few pages of C code that scan everything you type on a
keyboard, and selects only the credit card numbers.  How easy is that to
do with credit card numbers spoken over a telephone?

The key is large-scale automated attacks, not one-time interceptions.
--------
Nathaniel Borenstein <nsb@fv.com>
Chief Scientist, First Virtual Holdings
FAQ & PGP key: nsb+faq@nsb.fv.com





Thread