[9830] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Shades of FV's Nathaniel Borenstein: Carnivore's "Magic Lantern"

daemon@ATHENA.MIT.EDU (Jay Sulzberger)
Wed Nov 21 16:59:56 2001

Date: Wed, 21 Nov 2001 16:50:19 -0500 (EST)
From: Jay Sulzberger <jays@panix.com>
To: pasward@big.uwaterloo.ca
Cc: "R. A. Hettinga" <rah@shipwright.com>,
	Digital Bearer Settlement List <dbs@philodox.com>, <dcsb@ai.mit.edu>,
	<cryptography@wasabisystems.com>, Jay Sulzberger <jays@panix.com>
In-Reply-To: <15355.51931.911993.467195@tolstoy.uwaterloo.ca>
Message-ID: <Pine.NEB.4.40.0111211649221.28089-100000@panix2.panix.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII



On Wed, 21 Nov 2001 pasward@big.uwaterloo.ca wrote:

> R. A. Hettinga writes:
>  > Everyone remember First Virtual's Nat Borenstein's "major discovery" of the
>  > keyboard logger?
>  >
>  > 'Magic Lantern' part of new 'Enhanced Carnivore Project'
>
>  > [etc]
>
> In the same vein, but a different application, does anyone know what
> the state of the art is for detecting such tampering?  In particular,
> when sitting at a PC doing banking, is there any mechanism by which a
> user can know that the PC is not corrupted with such a key logger?
> The last time I checked, there was nothing other than the various
> anti-virus software.
>
> Paul

If you are running a source secret operating system, it is more difficult
to detect tampering.

oo--JS.




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post