From: “Dr.Dimitri Vulis KOTM” <dlv@bwalk.dm.com>
To: cypherpunks@toad.com
Message Hash: 0962589a63c09922f5ff33b5224e2ee17ee988ce82abb27001a7bf24400beaef
Message ID: <199702021555.HAA25423@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-02 15:55:43 UTC
Raw Date: Sun, 2 Feb 1997 07:55:43 -0800 (PST)
From: "Dr.Dimitri Vulis KOTM" <dlv@bwalk.dm.com>
Date: Sun, 2 Feb 1997 07:55:43 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Key Security Question
Message-ID: <199702021555.HAA25423@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
ichudov@algebra.com (Igor Chudov @ home) writes:
> Dr.Dimitri Vulis KOTM wrote:
> > Bill Stewart <stewarts@ix.netcom.com> writes:
> > > On the other hand, if the "repairman" replaced your pgp executable
> > > with version 2.6.3kgb, which uses your hashed passphrase as the
> > > session key, you're hosed. Or if he installed a keystroke sniffer,
> > > or added a small radio transmitter to your keyboard, or whatever.
> > > Depends on your threat model. If you need to be paranoid,
> > > they've already gotten you....
> >
> > If you're really paranoid, you can boot from a clean floppy and
> > reinstall everything from your backup tapes. You do have a
> > contingency plan in case your hard disk goes bad, or gets a
> > virus, don't you? Well, if you're in doubt, exercise it.
>
> And what if the repairman replaces BIOS ROM chips with KGBios?
On some computers it's possible to add executable code to the boot
sequence without replacing the actual ROM chip because they're
rewritiable. Examples: most Sun boxes; intel motherboards with
'flash bios'.
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
Return to February 1997
Return to ““William H. Geiger III” <whgiii@amaranth.com>”