[19838] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Unforgeable dialog.

daemon@ATHENA.MIT.EDU (James A. Donald)
Thu Feb 2 17:44:20 2006

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 02 Feb 2006 15:26:30 -0600
From: "James A. Donald" <jamesd@echeque.com>
To: "Bowness, Piers" <pbowness@rsasecurity.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE297072391A7@rsana-ex-hq1.NA.RSA.NET>

     --
Bowness, Piers wrote:
 > Once the attacker sees the "secure" dialog, what prevents them from
 > using the same techniques and/or code to create a visually identical
 > spoof? There have been several OS-level designs to create
 > hardware-supported secure dialogs. Needless to say, these schemes
 > became exceedingly complex and had a variety of implementation
 > issues (i.e. special graphics hardware, drivers, TCMs, etc.)
 >
 > I don't see your proposals as providing 'secure' data viewing or
 > data entry solutions. IMHO, the best bet is currently provided by
 > layered security software where each component monitors and reports
 > on the others. Even this approach is temporary at best as we're now
 > seeing with malware that attacks by first disabling the currently
 > available protection layers (e.g., anti-virus, firewalls).

My computer does not get malware.  It regularly gets phishing and
legitimate emails that are very difficult to tell apart.

The techniques I discuss would make them very easy to tell apart.

     --digsig
          James A. Donald
      6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
      1JOeu/66DKl9KMzOvnF83U6mD6SUSbLgXtgqAEz1
      4swvP0Ni9aalk9b1QtRcmLZWW2OeWw0Z77uFyH3Pj

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post