From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: 638602f47cac66548b99a0f03e244e5b64d0645cdedbdb71043348bd83a11197
Message ID: <199702031957.LAA00537@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-03 19:57:30 UTC
Raw Date: Mon, 3 Feb 1997 11:57:30 -0800 (PST)
From: paul@fatmans.demon.co.uk
Date: Mon, 3 Feb 1997 11:57:30 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Key Security Question
Message-ID: <199702031957.LAA00537@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
> > > On the other hand, if the "repairman" replaced your pgp executable
> > > with version 2.6.3kgb, which uses your hashed passphrase as the
> > > session key, you're hosed. Or if he installed a keystroke sniffer,
> > > or added a small radio transmitter to your keyboard, or whatever.
> > > Depends on your threat model. If you need to be paranoid,
> > > they've already gotten you....
> >
> > If you're really paranoid, you can boot from a clean floppy and
> > reinstall everything from your backup tapes. You do have a
> > contingency plan in case your hard disk goes bad, or gets a
> > virus, don't you? Well, if you're in doubt, exercise it.
Face it, the only solution is to wrap your computer, cat, family, car
and yourself in aluminium foil and burn your hard disk whilst
chanting "yamma yamma yamma yaaaaamaa"
Datacomms Technologies web authoring and data security
Paul Bradley, Paul@fatmans.demon.co.uk
Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: 5BBFAEB1
"Don`t forget to mount a scratch monkey"
Return to February 1997
Return to “paul@fatmans.demon.co.uk”
1997-02-03 (Mon, 3 Feb 1997 11:57:30 -0800 (PST)) - Re: Key Security Question - paul@fatmans.demon.co.uk