1997-02-02 - Re: Key Security Question

Header Data

From: ichudov@algebra.com
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: e97cb45d0b82f1c3583d849fae671239237216b78d4b2fc2b254b800e1a830a9
Message ID: <199702021013.CAA16577@toad.com>
Reply To: N/A
UTC Datetime: 1997-02-02 10:13:14 UTC
Raw Date: Sun, 2 Feb 1997 02:13:14 -0800 (PST)

Raw message

From: ichudov@algebra.com
Date: Sun, 2 Feb 1997 02:13:14 -0800 (PST)
To: Cypherpunks <cypherpunks@toad.com>
Subject: Re: Key Security Question
Message-ID: <199702021013.CAA16577@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


Dr.Dimitri Vulis KOTM wrote:
> Bill Stewart <stewarts@ix.netcom.com> writes:
> > On the other hand, if the "repairman" replaced your pgp executable
> > with version 2.6.3kgb, which uses your hashed passphrase as the
> > session key, you're hosed.  Or if he installed a keystroke sniffer,
> > or added a small radio transmitter to your keyboard, or whatever.
> > Depends on your threat model.  If you need to be paranoid,
> > they've already gotten you....
> 
> If you're really paranoid, you can boot from a clean floppy and
> reinstall everything from your backup tapes. You do have a
> contingency plan in case your hard disk goes bad, or gets a
> virus, don't you? Well, if you're in doubt, exercise it.

And what if the repairman replaces BIOS ROM chips with KGBios?

	- Igor.






Thread