From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: deb4901258add54f1819f40d2c4dcb75bd3968c6c1a77613214e655a718b514f
Message ID: <1.5.4.32.19970614004420.009dc794@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-06-14 01:17:29 UTC
Raw Date: Sat, 14 Jun 1997 09:17:29 +0800
From: John Young <jya@pipeline.com>
Date: Sat, 14 Jun 1997 09:17:29 +0800
To: cypherpunks@toad.com
Subject: Re: Impact of Netscape kernel hole
Message-ID: <1.5.4.32.19970614004420.009dc794@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
Huge Cajones wrote:
>Tim's post (although refuted by Marc) raises some serious issues since I
>suspect that Joe Public has his secret key sitting in c:\pgp\secring.pgp
Isn't it widely known that the secret key is not to be stored in the box, as the
PGP manual and security pubs emphasize?
Still, it would be good to know if a Netscape snooper could snarf a key while
it is being used by PGP to decrypt, that is, whether the hole allows snooping
on dynamic ops or just on stored info.
Does anyone know if the the hole finders are discussing this on the Net, and
if so, where? What are the folks at Netscape saying? Tom, Jeff?
Return to June 1997
Return to “Tom Weinstein <tomw@netscape.com>”