[24555] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Why I have a 512 bit PGP key

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Dec 27 22:23:04 1994

To: eric@remailer.net (Eric Hughes)
Cc: cypherpunks@toad.com
In-Reply-To: Your message of "Tue, 27 Dec 1994 18:40:52 PST."
             <199412280240.SAA02061@largo.remailer.net> 
Reply-To: perry@imsi.com
Date: Tue, 27 Dec 1994 22:07:44 -0500
From: "Perry E. Metzger" <perry@imsi.com>


Eric Hughes says:
>    From: "Ian Farquhar" <ianf@sydney.sgi.com>
> 
> re: personal account tripwire
> 
>    The problem is that although you can protect the data file of
>    hashes (by using a pass phrase to encrypt it), protecting the
>    binary which does the checking is rather more difficult.
> 
> Why not recompile the binary?  All it needs to be is something like
> md5.c.

Read Ken Thompson's Turing Award lecture for why that isn't
sufficient. Its quite amusing.

Lets face it -- if you are truly paranoid, you have to carry your
machine around with you at all times and chain it to you.

Its all a question of threat model. For national security type attacks
nothing less than "chain machine to wrist" will do. For stopping a
casual attack, much less is needed. Its all in the threat model...

Perry

home help back first fref pref prev next nref lref last post