1997-01-27 - Passphrase Online…

Header Data

From: harka@nycmetro.com
To: cypherpunks@toad.com
Message Hash: 8edde51fc79a086a373bc01a856981132d215cfd50189bad805c6db2461397f2
Message ID: <199701270833.DAA31377@linux.nycmetro.com>
Reply To: N/A
UTC Datetime: 1997-01-27 08:17:50 UTC
Raw Date: Mon, 27 Jan 1997 00:17:50 -0800 (PST)

Raw message

From: harka@nycmetro.com
Date: Mon, 27 Jan 1997 00:17:50 -0800 (PST)
To: cypherpunks@toad.com
Subject: Passphrase Online...
Message-ID: <199701270833.DAA31377@linux.nycmetro.com>
MIME-Version: 1.0
Content-Type: text/plain



-----BEGIN PGP SIGNED MESSAGE-----

>If I am connected to the Internet via a SLIP/PPP connection and I
>type my passphrase while being online (for example, in Private
>Idaho, after getting my mail), could that passphrase be compromised?
>If so, how would that be done?

:Paranoid yet?  Good.  That's a healthy state to be in.  Fortunately,
:most developers (like Joel) don't put any such evil hooks into
:their software.  Having access to the source, to be able to read
:through it yourself, is IMO one of the better ways to be sure about
:such things. Reading the source and recompiling it yourself is
:probably the best.

:Still paranoid?  Excellent.

Paranoia!! I love that word :)...What about somebody snooping on my phoneline, while I type the passphrase? :)


Harka



-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBMucbDzltEBIEF0MBAQH/Wwf8DeH6rBzczDPjc00sEAV649EHmZu3Fm5W
QCIbtRT9+NWHb4jHmbB5jBkUpkswBDwbisQoZ/XKKhCKeMHbUKWApWiq9jPuvg9w
aSsal+8uqVyHLnKEiq1xqjih7rurwRC3qsWWq6Mr7XDgICzfh4XonKgp7ln6LuQj
HKk+ewTNND+7WDYGQFAz6VkGzELSjKuPgNRv614IwyC0VXDHH/DJRaEOnBUYa9e2
FfcHUyZANWuHVscHwDCPKIVy+tR8UzsYhhwrIOf1e2KZhTfRMLiP/Tqaaup/C0Nr
r5Bjp76e5VPtQ4GsdhrzQT9wjaV2apWq4eDRvkLMq8fVSkV/+ZaTKg==
=qEst
-----END PGP SIGNATURE-----






Thread