John Young wrote: | If this is logging (and related retrieval) is done covertly, | encryption could thereby become a falsely reassuring | cloak of privacy. | | Dave thinks devices like these are surely in the works, | and he can say more about their sponsors, technologies | and implementations. Keystroke logging technology exists commercially as a result of the shit reliability of commercial OSs. Turning one of them quite stealth wouldn't be hard; they're very innocous as is. Also note things like the recent MS 'send chunks of ram in Word documents' bug in Word for the Mac. (Actually an OLE bug.) The benefit to encryption is not that it makes your data secure, but that it allows you to communicate safely in the presense of adversaries. (Rivest's definition.) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume