Sealing wax & eKeyboard

Sunder sunder at sunder.net
Wed Jul 16 10:23:02 PDT 2003


Geez!  You guys have the DUMBEST ideas ever!  For fuck's sake, go and
RTFA! (For the dumb: READ THE FUCKING ARCHIVES!)

Anything displayed on your screen is visible to the guy across the street
with a TEMPEST detector unless you work in a Faraday cage.  Failing that a
hidden pinhole camera, or an RF transmitter attached to your cable -- hell
these are available for hobbist use right now: x10.com has small devices
that you can use to broadcast video from one room to another.  Getting the
same done for VGA, XVGA, etc. shouldn't be any harder.

Using IR or RF is one of the stupidest things you could possibly
do.  Think!  IR and RF are detectable from a distance!

Ok, some IR auth is ok, provided it's in a sealed chamber and no photons
leak out.  i.e. think of a two cylinders, sealed at the ends where the
cables go, where one fits inside the other... sort of like fiber optic
cables and connectors.  No leaks.

Direct contact's obviously fine, so long as your alleged attacker can't
tap into it.

----------------------Kaos-Keraunos-Kybernetos---------------------------
 + ^ + :25Kliters anthrax, 38K liters botulinum toxin, 500 tons of   /|\
  \|/  :sarin, mustard and VX gas, mobile bio-weapons labs, nukular /\|/\
<--*-->:weapons.. Reasons for war on Iraq - GWB 2003-01-28 speech.  \/|\/
  /|\  :Found to date: 0.  Cost of war: $800,000,000,000 USD.        \|/
 + v + :           The look on Sadam's face - priceless!       
--------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------

On Wed, 16 Jul 2003, Thomas Shaddack wrote:

> However, this will work around the keyboard loggers, but will cause
> development of eg. programs saving the screenshots at the moment of a
> mouseclick. (Which is definitely more detectable - by storing bulk amounts
> of data - than just a plain keylogger, disadvantaging the adversary
> somehow.) Also won't protect against ceiling cams, if they'd have enough
> resolution to see the screen clearly enough.
> 
> Couldn't there be some challenge-response device, eg. over IrDA or radio
> waves or direct contact (eg, iButton DS1955B or DS1957B), which would be
> unlocked by something like a PIN code? How to avoid the leakage of the PIN
> and subsequent seizure of the device then?





More information about the cypherpunks-legacy mailing list