From: harka@nycmetro.com
To: cypherpunks@toad.com
Message Hash: 6e15627d65145eaa6702abf69ce2f78c1500323d3453f365e903fc76418e0dd5
Message ID: <199701271426.GAA23780@toad.com>
Reply To: N/A
UTC Datetime: 1997-01-27 14:26:22 UTC
Raw Date: Mon, 27 Jan 1997 06:26:22 -0800 (PST)
From: harka@nycmetro.com
Date: Mon, 27 Jan 1997 06:26:22 -0800 (PST)
To: cypherpunks@toad.com
Subject: Passphrase Online...
Message-ID: <199701271426.GAA23780@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
>If I am connected to the Internet via a SLIP/PPP connection and I
>type my passphrase while being online (for example, in Private
>Idaho, after getting my mail), could that passphrase be compromised?
>If so, how would that be done?
:Paranoid yet? Good. That's a healthy state to be in. Fortunately,
:most developers (like Joel) don't put any such evil hooks into
:their software. Having access to the source, to be able to read
:through it yourself, is IMO one of the better ways to be sure about
:such things. Reading the source and recompiling it yourself is
:probably the best.
:Still paranoid? Excellent.
Paranoia!! I love that word :)...What about somebody snooping on my phoneline, while I type the passphrase? :)
Harka
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQEVAwUBMucbDzltEBIEF0MBAQH/Wwf8DeH6rBzczDPjc00sEAV649EHmZu3Fm5W
QCIbtRT9+NWHb4jHmbB5jBkUpkswBDwbisQoZ/XKKhCKeMHbUKWApWiq9jPuvg9w
aSsal+8uqVyHLnKEiq1xqjih7rurwRC3qsWWq6Mr7XDgICzfh4XonKgp7ln6LuQj
HKk+ewTNND+7WDYGQFAz6VkGzELSjKuPgNRv614IwyC0VXDHH/DJRaEOnBUYa9e2
FfcHUyZANWuHVscHwDCPKIVy+tR8UzsYhhwrIOf1e2KZhTfRMLiP/Tqaaup/C0Nr
r5Bjp76e5VPtQ4GsdhrzQT9wjaV2apWq4eDRvkLMq8fVSkV/+ZaTKg==
=qEst
-----END PGP SIGNATURE-----
Return to January 1997
Return to “harka@nycmetro.com”