From: ichudov@algebra.com (Igor Chudov @ home)
To: cypherpunks@toad.com (Cypherpunks)
Message Hash: a68693f2013f9ff8a3d1264d3e99afc10c292cb0a1f93cbbdd45d2a7fe602620
Message ID: <199702020557.XAA17186@manifold.algebra.com>
Reply To: <9gDH2D8w165w@bwalk.dm.com>
UTC Datetime: 1997-02-02 06:02:56 UTC
Raw Date: Sat, 1 Feb 1997 22:02:56 -0800 (PST)
From: ichudov@algebra.com (Igor Chudov @ home)
Date: Sat, 1 Feb 1997 22:02:56 -0800 (PST)
To: cypherpunks@toad.com (Cypherpunks)
Subject: Re: Key Security Question
In-Reply-To: <9gDH2D8w165w@bwalk.dm.com>
Message-ID: <199702020557.XAA17186@manifold.algebra.com>
MIME-Version: 1.0
Content-Type: text
Dr.Dimitri Vulis KOTM wrote:
> Bill Stewart <stewarts@ix.netcom.com> writes:
> > On the other hand, if the "repairman" replaced your pgp executable
> > with version 2.6.3kgb, which uses your hashed passphrase as the
> > session key, you're hosed. Or if he installed a keystroke sniffer,
> > or added a small radio transmitter to your keyboard, or whatever.
> > Depends on your threat model. If you need to be paranoid,
> > they've already gotten you....
>
> If you're really paranoid, you can boot from a clean floppy and
> reinstall everything from your backup tapes. You do have a
> contingency plan in case your hard disk goes bad, or gets a
> virus, don't you? Well, if you're in doubt, exercise it.
And what if the repairman replaces BIOS ROM chips with KGBios?
- Igor.
Return to February 1997
Return to “ichudov@algebra.com (Igor Chudov @ home)”