[9830] in cryptography@c2.net mail archive
Re: Shades of FV's Nathaniel Borenstein: Carnivore's "Magic Lantern"
daemon@ATHENA.MIT.EDU (Jay Sulzberger)
Wed Nov 21 16:59:56 2001
Date: Wed, 21 Nov 2001 16:50:19 -0500 (EST)
From: Jay Sulzberger <jays@panix.com>
To: pasward@big.uwaterloo.ca
Cc: "R. A. Hettinga" <rah@shipwright.com>,
Digital Bearer Settlement List <dbs@philodox.com>, <dcsb@ai.mit.edu>,
<cryptography@wasabisystems.com>, Jay Sulzberger <jays@panix.com>
In-Reply-To: <15355.51931.911993.467195@tolstoy.uwaterloo.ca>
Message-ID: <Pine.NEB.4.40.0111211649221.28089-100000@panix2.panix.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
On Wed, 21 Nov 2001 pasward@big.uwaterloo.ca wrote:
> R. A. Hettinga writes:
> > Everyone remember First Virtual's Nat Borenstein's "major discovery" of the
> > keyboard logger?
> >
> > 'Magic Lantern' part of new 'Enhanced Carnivore Project'
>
> > [etc]
>
> In the same vein, but a different application, does anyone know what
> the state of the art is for detecting such tampering? In particular,
> when sitting at a PC doing banking, is there any mechanism by which a
> user can know that the PC is not corrupted with such a key logger?
> The last time I checked, there was nothing other than the various
> anti-virus software.
>
> Paul
If you are running a source secret operating system, it is more difficult
to detect tampering.
oo--JS.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com