[146827] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Protecting Private Keys

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Sun Sep 8 13:26:57 2013

X-Original-To: cryptography@metzdowd.com
Date: Sun, 08 Sep 2013 20:40:53 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: cryptography@metzdowd.com, jis@mit.edu
In-Reply-To: <20130907142052.GA4889@jis.tzo.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============8117042296495549336==
Content-Type: text/plain

"Jeffrey I. Schiller" <jis@mit.edu> writes:

>If I was the NSA, I would be scavenging broken hardware from “interesting”
>venues and purchasing computers for sale in interesting locations. I would be
>particularly interested in stolen computers, as they have likely not been
>wiped.

Just buy second-hand HSMs off eBay, they often haven't been wiped, and the
PINs are conveniently taped to the case.  I have a collection of interesting
keys (or at least keys from interesting places, including government
departments) obtained in this way.

Peter.

--===============8117042296495549336==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============8117042296495549336==--

home help back first fref pref prev next nref lref last post