From: paul@fatmans.demon.co.uk
To: cypherpunks@toad.com
Message Hash: aa913f28b3e97ecb0f874cbcef06430244e42c3f106323a96fa6e1405aeef928
Message ID: <854982969.56802.0@fatmans.demon.co.uk>
Reply To: N/A
UTC Datetime: 1997-02-03 18:04:02 UTC
Raw Date: Mon, 3 Feb 1997 10:04:02 -0800 (PST)
From: paul@fatmans.demon.co.uk
Date: Mon, 3 Feb 1997 10:04:02 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Key Security Question
Message-ID: <854982969.56802.0@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
> > > On the other hand, if the "repairman" replaced your pgp executable
> > > with version 2.6.3kgb, which uses your hashed passphrase as the
> > > session key, you're hosed. Or if he installed a keystroke sniffer,
> > > or added a small radio transmitter to your keyboard, or whatever.
> > > Depends on your threat model. If you need to be paranoid,
> > > they've already gotten you....
> >
> > If you're really paranoid, you can boot from a clean floppy and
> > reinstall everything from your backup tapes. You do have a
> > contingency plan in case your hard disk goes bad, or gets a
> > virus, don't you? Well, if you're in doubt, exercise it.
Face it, the only solution is to wrap your computer, cat, family, car
and yourself in aluminium foil and burn your hard disk whilst
chanting "yamma yamma yamma yaaaaamaa"
Datacomms Technologies web authoring and data security
Paul Bradley, Paul@fatmans.demon.co.uk
Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: 5BBFAEB1
"Don`t forget to mount a scratch monkey"
Return to February 1997
Return to “paul@fatmans.demon.co.uk”
1997-02-03 (Mon, 3 Feb 1997 10:04:02 -0800 (PST)) - Re: Key Security Question - paul@fatmans.demon.co.uk