From: “Perry E. Metzger” <perry@imsi.com>
To: eric@remailer.net (Eric Hughes)
Message Hash: 7002e542fea3d5cdaf26991ff831716de15c58cdd48e7e7345da0b54a35d925d
Message ID: <9412280307.AA03703@snark.imsi.com>
Reply To: <199412280240.SAA02061@largo.remailer.net>
UTC Datetime: 1994-12-28 03:07:54 UTC
Raw Date: Tue, 27 Dec 94 19:07:54 PST
From: "Perry E. Metzger" <perry@imsi.com>
Date: Tue, 27 Dec 94 19:07:54 PST
To: eric@remailer.net (Eric Hughes)
Subject: Re: Why I have a 512 bit PGP key
In-Reply-To: <199412280240.SAA02061@largo.remailer.net>
Message-ID: <9412280307.AA03703@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain
Eric Hughes says:
> From: "Ian Farquhar" <ianf@sydney.sgi.com>
>
> re: personal account tripwire
>
> The problem is that although you can protect the data file of
> hashes (by using a pass phrase to encrypt it), protecting the
> binary which does the checking is rather more difficult.
>
> Why not recompile the binary? All it needs to be is something like
> md5.c.
Read Ken Thompson's Turing Award lecture for why that isn't
sufficient. Its quite amusing.
Lets face it -- if you are truly paranoid, you have to carry your
machine around with you at all times and chain it to you.
Its all a question of threat model. For national security type attacks
nothing less than "chain machine to wrist" will do. For stopping a
casual attack, much less is needed. Its all in the threat model...
Perry
Return to December 1994
Return to “Thomas Grant Edwards <tedwards@src.umd.edu>”