PGP flaw found by Czech firm allows dig sig to be forged
Ray Dillinger
bear at sonic.net
Fri Mar 23 20:38:02 PST 2001
>BO, trojans, http tunelling and similar are really not rocket science
>these days. 99% of sheeple machines are vulnerable. This is perfectly
>valid and real attack. Not on my machines and probably not on yours -
>that does not make any difference.
>
>This is just another data point supporting secure devices insulated
>from microshit OS, java and wintels in general. Running PGP in the
>environment where attachment execution and/or java and/or activex are
>tolerated does not make any sense.
I want a laptop where someone could take out the disk platters,
scan them with a STM, do every "reconstruction" trick known to
humankind, and still not be able to tell basic things like how
much of the drive is in use or what operating system is installed.
To use it, you would have to enter the correct passphrase on
bootup (256 characters would be about the shortest maximum
passphrase length that would be worthwhile) for the BIOS to
make into a key to encrypt the drive writes and decrypt the
drive reads.
The drive encryption would have to be handled purely in
hardware on the HD controller, specifically so that there
is NO WAY for software running on the box to get around it.
Every write and Every read.
And finally, it would have to have some kind of tamperproof
keyboard -- noplace to install hardware key loggers.
I think that's about the bare minimum for a theft-secure
machine. (A machine which can be stolen without you having
to worry about someone else getting the data on it).
Network security, if you hook it up to a network, is a separate
and more complex problem, but I think that it *is* possible to
make a theft-secure machine.
Bear
More information about the cypherpunks-legacy
mailing list