From: Erp <erp@digiforest.com>
To: John Shaft <shaft@africamail.com>
Message Hash: 99967c39d66d22e580ce342e017f26726377a487b5620b4d26539496e9f25768
Message ID: <Pine.LNX.3.95.970127152242.7173A-100000@digital.digiforest.com>
Reply To: <199701271947.LAA03025@toad.com>
UTC Datetime: 1997-01-27 22:23:13 UTC
Raw Date: Mon, 27 Jan 1997 14:23:13 -0800 (PST)
From: Erp <erp@digiforest.com>
Date: Mon, 27 Jan 1997 14:23:13 -0800 (PST)
To: John Shaft <shaft@africamail.com>
Subject: Re: Passphrase Online...
In-Reply-To: <199701271947.LAA03025@toad.com>
Message-ID: <Pine.LNX.3.95.970127152242.7173A-100000@digital.digiforest.com>
MIME-Version: 1.0
Content-Type: text/plain
> I suppose if you were doing something locally, and someone wanted to be
> really sneaky, they could embed something like keycopy on your machine (with
> a virus or something) and get coppied every time you enter a keystroke. I
> don't suppose it would be all that difficult to get a machine to run a tsr
> that got kicked off every time you accessed something like, say ,
> PGP....Comments?
Ok, just something that would be a nasty little virii in its own way...
If there was a virii produced that copied down a persons keystrokes every
time, and then when they logged onto the InterNet aka aachieved a PPP/Slip
connection, it automatically sent (without there knowing) a copy of all
the keystorkes they have made so far, and then deletes them from an
encrypted file, or from within a file it has been adding them too
*shrug*...
.. aka Automatically sends it to say an anonymous email account or some
such.
Ok *shrug* jsut an idea... later.....
Erp
***************************************************
Hey we have fun here at hell! Check us out if your lucky:
http://www.fromhell.com/
Return to January 1997
Return to “John Shaft <shaft@africamail.com>”