[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Covert Access to Data and ID



John Young wrote:

| If this is logging (and related retrieval) is done covertly, 
| encryption could thereby become a falsely reassuring 
| cloak of privacy.
| 
| Dave thinks devices like these are surely in the works,
| and he can say more about their sponsors, technologies 
| and implementations.

	Keystroke logging technology exists commercially as a result
of the shit reliability of commercial OSs.  Turning one of them
quite stealth wouldn't be hard; they're very innocous as is.

	Also note things like the recent MS 'send chunks of ram in
Word documents' bug in Word for the Mac.  (Actually an OLE bug.)

	The benefit to encryption is not that it makes your data
secure, but that it allows you to communicate safely in the presense
of adversaries.  (Rivest's definition.)

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume