1995-11-21 - Re: Virus attacks on PGP

Header Data

From: SINCLAIR DOUGLAS N <sinclai@ecf.toronto.edu>
To: frantz@netcom.com (Bill Frantz)
Message Hash: c2c3daca070c583b0a362b6efaef3ed0cdef70c39b0a5d603b161371b796d5c4
Message ID: <95Nov21.083447edt.10061@cannon.ecf.toronto.edu>
Reply To: <199511210732.XAA04912@netcom18.netcom.com>
UTC Datetime: 1995-11-21 13:51:32 UTC
Raw Date: Tue, 21 Nov 1995 21:51:32 +0800

Raw message

From: SINCLAIR  DOUGLAS N <sinclai@ecf.toronto.edu>
Date: Tue, 21 Nov 1995 21:51:32 +0800
To: frantz@netcom.com (Bill Frantz)
Subject: Re: Virus attacks on PGP
In-Reply-To: <199511210732.XAA04912@netcom18.netcom.com>
Message-ID: <95Nov21.083447edt.10061@cannon.ecf.toronto.edu>
MIME-Version: 1.0
Content-Type: text/plain


> Certainly having PGP run from a CDROM or other read-only device would be a
> big help.  Even better would be to have all the privileged code also run
> from a read-only device.

Seeing as PGP is quite small the simplest and cheapest read-only device
would be a write-protected floppy disk.

Could a virus write to a write-protected disk?  I'm not sure if the
protection is done in the BIOS or the drive hardware.





Thread