[1078] in cryptography@c2.net mail archive
Re: Thoughts on the next target.
daemon@ATHENA.MIT.EDU (Scott Baker)
Tue Jun 24 15:03:55 1997
Date: Tue, 24 Jun 1997 13:47:37 -0700
From: Scott Baker <baker@ohcu.org>
Reply-To: baker@ohcu.org
To: cryptography@c2.net
Paul Bradley wrote:
> A nice attack, although more likely to get someone into trouble, may be
> to attack a real online banking system which allows 40 bit SSL sessions,
> then post the customers balance all over the place (real name, address etc.
> removed for obvious reasons of course). The sqeamish ossifrage 40 bit SSL
> crack was good, this would be even better because it would make the
> public sit up and listen, non-technical people hate losing money just as
> much as anyone else.
>
> As I see it banking is the system to attack, as it is the real public
> "killer-app" of cryptography at present, and gives a real quantifiable
> cost of a key break.
>
I assume you like doing time in a federal prison, right?
______________________________
Scott Baker
Old Hickory Credit Union
baker@ohcu.org