1997-02-02 - Re: Key Security Question

Header Data

From: “Dr.Dimitri Vulis KOTM” <dlv@bwalk.dm.com>
To: cypherpunks@toad.com
Message Hash: 0962589a63c09922f5ff33b5224e2ee17ee988ce82abb27001a7bf24400beaef
Message ID: <199702021555.HAA25423@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-02 15:55:43 UTC
Raw Date: Sun, 2 Feb 1997 07:55:43 -0800 (PST)

Raw message

From: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Date: Sun, 2 Feb 1997 07:55:43 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Key Security Question
Message-ID: <199702021555.HAA25423@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


ichudov@algebra.com (Igor Chudov @ home) writes:

> Dr.Dimitri Vulis KOTM wrote:
> > Bill Stewart <stewarts@ix.netcom.com> writes:
> > > On the other hand, if the "repairman" replaced your pgp executable
> > > with version 2.6.3kgb, which uses your hashed passphrase as the
> > > session key, you're hosed.  Or if he installed a keystroke sniffer,
> > > or added a small radio transmitter to your keyboard, or whatever.
> > > Depends on your threat model.  If you need to be paranoid,
> > > they've already gotten you....
> >
> > If you're really paranoid, you can boot from a clean floppy and
> > reinstall everything from your backup tapes. You do have a
> > contingency plan in case your hard disk goes bad, or gets a
> > virus, don't you? Well, if you're in doubt, exercise it.
>
> And what if the repairman replaces BIOS ROM chips with KGBios?

On some computers it's possible to add executable code to the boot
sequence without replacing the actual ROM chip because they're
rewritiable. Examples: most Sun boxes; intel motherboards with
'flash bios'.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps






Thread