From: ichudov@algebra.com
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: e97cb45d0b82f1c3583d849fae671239237216b78d4b2fc2b254b800e1a830a9
Message ID: <199702021013.CAA16577@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-02 10:13:14 UTC
Raw Date: Sun, 2 Feb 1997 02:13:14 -0800 (PST)
From: ichudov@algebra.com
Date: Sun, 2 Feb 1997 02:13:14 -0800 (PST)
To: Cypherpunks <cypherpunks@toad.com>
Subject: Re: Key Security Question
Message-ID: <199702021013.CAA16577@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
Dr.Dimitri Vulis KOTM wrote:
> Bill Stewart <stewarts@ix.netcom.com> writes:
> > On the other hand, if the "repairman" replaced your pgp executable
> > with version 2.6.3kgb, which uses your hashed passphrase as the
> > session key, you're hosed. Or if he installed a keystroke sniffer,
> > or added a small radio transmitter to your keyboard, or whatever.
> > Depends on your threat model. If you need to be paranoid,
> > they've already gotten you....
>
> If you're really paranoid, you can boot from a clean floppy and
> reinstall everything from your backup tapes. You do have a
> contingency plan in case your hard disk goes bad, or gets a
> virus, don't you? Well, if you're in doubt, exercise it.
And what if the repairman replaces BIOS ROM chips with KGBios?
- Igor.
Return to February 1997
Return to “ichudov@algebra.com”
1997-02-02 (Sun, 2 Feb 1997 02:13:14 -0800 (PST)) - Re: Key Security Question - ichudov@algebra.com