1996-03-15 - Re: Remailer passphrases

Header Data

From: frantz@netcom.com (Bill Frantz)
To: adam@lighthouse.homeport.org (Adam Shostack)
Message Hash: 913fa1064e97a84b12d4042e0b3d28a4fb2db3c1cbb09e7d8ca0b8dc677348f0
Message ID: <199603140644.WAA05138@netcom6.netcom.com>
Reply To: N/A
UTC Datetime: 1996-03-15 03:45:27 UTC
Raw Date: Fri, 15 Mar 1996 11:45:27 +0800

Raw message

From: frantz@netcom.com (Bill Frantz)
Date: Fri, 15 Mar 1996 11:45:27 +0800
To: adam@lighthouse.homeport.org (Adam Shostack)
Subject: Re: Remailer passphrases
Message-ID: <199603140644.WAA05138@netcom6.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain


At 12:13 AM 3/14/96 -0600, Alex Strasheim wrote:
>(I have no idea how hard it would be to steal information from a running
>machine's ram -- or if it's even possible).

It is probably possible.  Put a clip across the CPU chip, and take over
from it by raising it's chip disable will work with some microprocessors. 
However, the proper application of various kinds of rubber hose to the
operator should make that kind of attack unnecessary.

"Perfect" Forward Security or some approximation helps protect the operator
against such an attack by reducing the amount of compromised material, and
therefore the incentive.

Regards - Bill


------------------------------------------------------------------------
Bill Frantz       | The CDA means  | Periwinkle  --  Computer Consulting
(408)356-8506     | lost jobs and  | 16345 Englewood Ave.
frantz@netcom.com | dead teenagers | Los Gatos, CA 95032, USA







Thread