From: “Peter Trei” <trei@process.com>
To: cypherpunks@toad.com
Message Hash: e754d46f82757e7f69e625b45420626a41d0863087c0f1021f2dda13dc48fa61
Message ID: <199610091952.MAA16556@toad.com>
Reply To: N/A
UTC Datetime: 1996-10-09 19:52:50 UTC
Raw Date: Wed, 9 Oct 1996 12:52:50 -0700 (PDT)
From: "Peter Trei" <trei@process.com>
Date: Wed, 9 Oct 1996 12:52:50 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: Microsoft CAPI
Message-ID: <199610091952.MAA16556@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
> Ravi Pandya wrote:
> > ... You can't load an encryption engine into Windows 95 or
> > Windows NT unless that engine has been specially signed by
> > Microsoft's corporate key.
>
> And so what happens when the Microsoft key is compromised? It might
> be hard to break by purely cryptographic means, but surely there are
> some people at Microsoft who aren't millionaires.
Much easier would be to patch the OS to disable the signature check
by the CryptoAPI. A patching program, once written, would require no
particular skill to run.
Sort of like 'rechipping' a high-end sportscar.
Peter Trei
Senior Software Engineer
Purveyor Development Team
Process Software Corporation
http://www.process.com
trei@process.com
Return to October 1996
Return to ““Peter Trei” <trei@process.com>”
1996-10-09 (Wed, 9 Oct 1996 12:52:50 -0700 (PDT)) - Re: Microsoft CAPI - “Peter Trei” <trei@process.com>