At 05:53 PM 11/20/2001 -0800, FogStorm wrote: http://www.msnbc.com/news/660096.asp?0si=-&cp1=1 ... MAGIC LANTERN installs so-called keylogging software on a suspect's machine that is capable of capturing keystrokes typed on a computer. By tracking exactly what a suspect types, critical encryption key information can be gathered, and then transmitted back to the FBI, according to the source, who requested anonymity. The virus can be sent to the suspect via e-mail perhaps sent for the FBI by a trusted friend or relative. The FBI can also use common vulnerabilities to break into a suspect's computer and insert Magic Lantern, the source said. Magic Lantern is one of a series of enhancements currently being developed for the FBI's Carnivore project, the source said, under the umbrella project name of Cyber Knight.
>>>>>>>>>>>>>>>>>
Possible countermeasures: 1. Air gap - run your pgp client from a machine which is never connected to the net 2. Add ID token (e.g., Dallas Semi iButton) support to gpg
On Wed, 21 Nov 2001 mean-green@hushmail.com wrote:
2. Add ID token (e.g., Dallas Semi iButton) support to gpg
Doesn't suffice, if you see/encrypt clear on a compromised machine. Air gap or a dedicated hardened crypto machine (embedded with a private eye type of display connected to the main machine via a simple, provably secure protocol). Airgap (MOD sneakernet) is the easiest solution so far. But we've been through this before.
participants (2)
-
Eugene Leitl
-
mean-green@hushmail.com