Covert Access to Data and ID

Adam Shostack adam at homeport.org
Wed Jul 8 14:38:58 PDT 1998


John Young wrote:

| If this is logging (and related retrieval) is done covertly, 
| encryption could thereby become a falsely reassuring 
| cloak of privacy.
| 
| Dave thinks devices like these are surely in the works,
| and he can say more about their sponsors, technologies 
| and implementations.

	Keystroke logging technology exists commercially as a result
of the shit reliability of commercial OSs.  Turning one of them
quite stealth wouldn't be hard; they're very innocous as is.

	Also note things like the recent MS 'send chunks of ram in
Word documents' bug in Word for the Mac.  (Actually an OLE bug.)

	The benefit to encryption is not that it makes your data
secure, but that it allows you to communicate safely in the presense
of adversaries.  (Rivest's definition.)

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume








More information about the cypherpunks-legacy mailing list