[9726] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: IP: Fw: [FiB FORUM] Anti-Terror Tools Include High-Tech

daemon@ATHENA.MIT.EDU (Enzo Michelangeli)
Tue Oct 30 10:43:59 2001

Date: 30 Oct 2001 01:34:50 -0800
Message-ID: <20011030093450.2916.cpmta@c007.snv.cp.net>
Content-Type: text/plain
Content-Disposition: inline
Mime-Version: 1.0
To: rah@shipwright.com
From: Enzo Michelangeli <em@who.net>
Cc: cryptography@wasabisystems.com
X-Sent-From: admin@i-t-vision.com

On Mon, 29 October 2001, "R. A. Hettinga" wrote:

[...]
> The key-logger, hidden inside a computer, secretly records everything a
> suspect
> types on it.  The device lets authorities capture passwords to unscramble data
> files in otherwise-unbreakable codes.

So what happens if the application gets the passphrase from mouse clicks over a virtual keyboard displayed on the screen (maybe with layout randomly scrambled, non-standard fonts etc)? This isn't even an original idea: Nat Borenstein used it, a few years ago, in the UI for the now defunct First Virtual payment system.

Enzo



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post