[9827] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Shades of FV's Nathaniel Borenstein: Carnivore's "Magic Lantern"

daemon@ATHENA.MIT.EDU (pasward@big.uwaterloo.ca)
Wed Nov 21 16:16:54 2001

From: <pasward@big.uwaterloo.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <15356.5063.829045.562675@tolstoy.uwaterloo.ca>
Date: Wed, 21 Nov 2001 15:51:19 -0500
To: Kent Borg <kentborg@borg.org>
Cc: pasward@big.uwaterloo.ca, "R. A. Hettinga" <rah@shipwright.com>,
	Digital Bearer Settlement List <dbs@philodox.com>, dcsb@ai.mit.edu,
	cryptography@wasabisystems.com
In-Reply-To: <20011121133116.E20873@borg.org>

Kent Borg writes:
 > On Wed, Nov 21, 2001 at 10:40:11AM -0500, pasward@big.uwaterloo.ca wrote:
 > > In the same vein, but a different application, does anyone know what
 > > the state of the art is for detecting such tampering?  In particular,
 > > when sitting at a PC doing banking, is there any mechanism by which a
 > > user can know that the PC is not corrupted with such a key logger?
 > > The last time I checked, there was nothing other than the various
 > > anti-virus software.
 > 
 > I can imagine an arms race between the Feds and anti-virus-types, that
 > is until the anti-virus programs are strong-armed one way or the other
 > into backing down.  I am certain that will happen, either behind the
 > scenes or by public law.
 > 
 > I think you are toast if you are sitting at a PC and the Feds ~really~
 > want to catch your keystrokes.  That is, if the Feds are acting
 > competently.  They might be coy with their good keyloggers to keep
 > samizdat word of their details from getting out.  They might save the
 > good stuff for important targets.

My concern isn't with the Feds snooping.  It is with some criminal who
wants banking-type information so as to rob the account, though it
would appear that solving the one implies solving the other.

 > Alternatively, to move to a physical analogy, instead of leaving a
 > telltale thread on your door and trying to spot intruders that way,
 > you might instead invest in good locks in the first place.  That is,
 > to use a reasonably secure operating system.  At risk of starting an
 > OS war, a well managed Linux box is going to be pretty secure.
 > 
 > Or, for a practical example, I am typing this on a Linux notebook that
 > mostly is obscured behind firewalls.  If I keep damn Javascript OFF
 > and don't launch viruses that might be sent to me, and don't reuse
 > passwords between here and an unsecure computer, I think they are
 > going to have a very hard time cracking in without my knowing.

But this doesn't really address the question.  Certainly you take
various precautions.  The question is: how can I know if the system is
compromised?

Paul



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post