[11456] in cryptography@c2.net mail archive
Re: TCPA/Palladium -- likely future implications (Re: dangers of
daemon@ATHENA.MIT.EDU (Peter Fairbrother)
Sun Aug 11 19:47:31 2002
X-Envelope-To: adam@cypherspace.org
Date: Sun, 11 Aug 2002 19:09:22 +0100
From: Peter Fairbrother <zenadsl6186@zen.co.uk>
To: Adam Back <adam@cypherspace.org>,
Seth David Schoen <schoen@loyalty.org>,
"R. Hirschfeld" <ray@unipay.nl>, <peternbiddle@hotmail.com>
Cc: Cryptography <cryptography@wasabisystems.com>,
Cypherpunks <cypherpunks@minder.net>
In-Reply-To: <20020809221356.A637432@exeter.ac.uk>
Adam Back wrote:
[...]
> - It is always the case that targetted people can have hardware
> attacks perpetrated against them. (Keyboard sniffers placed during
> court authorised break-in as FBI has used in mob case of PGP using
> Mafiosa [1]).
[...]
> [1] "FBI Bugs Keyboard of PGP-Using Alleged Mafioso", 6 Dec 2000,
> slashdot
That was a software keylogger (actually two software keyloggers), not
hardware.
(IMO Scarfo's lawyers should never have dealt, assuming the evidence was
necessary for a conviction, but the FBI statement about the techniques used
was probably too obfuscated for them - it took me a good week to understand
it. I emailed them, but got no reply.
Incidently, Nicky Scarfo used his father's prison number for the password,
so a well researched directed dictionary attack would have worked anyway.)
The FBI reputedly can (usually, on Windows boxen) now install similar
software keyloggers remotely, without needing to break in.
-- Peter Fairbrother
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com