Key Security Question

Dr.Dimitri Vulis KOTM dlv at bwalk.dm.com
Sun Feb 2 07:55:43 PST 1997


ichudov at algebra.com (Igor Chudov @ home) writes:

> Dr.Dimitri Vulis KOTM wrote:
> > Bill Stewart <stewarts at ix.netcom.com> writes:
> > > On the other hand, if the "repairman" replaced your pgp executable
> > > with version 2.6.3kgb, which uses your hashed passphrase as the
> > > session key, you're hosed.  Or if he installed a keystroke sniffer,
> > > or added a small radio transmitter to your keyboard, or whatever.
> > > Depends on your threat model.  If you need to be paranoid,
> > > they've already gotten you....
> >
> > If you're really paranoid, you can boot from a clean floppy and
> > reinstall everything from your backup tapes. You do have a
> > contingency plan in case your hard disk goes bad, or gets a
> > virus, don't you? Well, if you're in doubt, exercise it.
>
> And what if the repairman replaces BIOS ROM chips with KGBios?

On some computers it's possible to add executable code to the boot
sequence without replacing the actual ROM chip because they're
rewritiable. Examples: most Sun boxes; intel motherboards with
'flash bios'.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps







More information about the cypherpunks-legacy mailing list