1997-02-03 - Re: Key Security Question

Header Data

From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: aa913f28b3e97ecb0f874cbcef06430244e42c3f106323a96fa6e1405aeef928
Message ID: <854982969.56802.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1997-02-03 18:04:02 UTC
Raw Date: Mon, 3 Feb 1997 10:04:02 -0800 (PST)

Raw message

From: paul@fatmans.demon.co.uk
Date: Mon, 3 Feb 1997 10:04:02 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Key Security Question
Message-ID: <854982969.56802.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain



> > > On the other hand, if the "repairman" replaced your pgp executable
> > > with version 2.6.3kgb, which uses your hashed passphrase as the
> > > session key, you're hosed.  Or if he installed a keystroke sniffer,
> > > or added a small radio transmitter to your keyboard, or whatever.
> > > Depends on your threat model.  If you need to be paranoid,
> > > they've already gotten you....
> > 
> > If you're really paranoid, you can boot from a clean floppy and
> > reinstall everything from your backup tapes. You do have a
> > contingency plan in case your hard disk goes bad, or gets a
> > virus, don't you? Well, if you're in doubt, exercise it.

Face it, the only solution is to wrap your computer, cat, family, car 
and yourself in aluminium foil and burn your hard disk whilst 
chanting "yamma yamma yamma yaaaaamaa"


  Datacomms Technologies web authoring and data security
       Paul Bradley, Paul@fatmans.demon.co.uk
  Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: 5BBFAEB1
     "Don`t forget to mount a scratch monkey"





Thread