[148088] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[Cryptography] How Snowden broke the NSA, how to break them again.

daemon@ATHENA.MIT.EDU (Phillip Hallam-Baker)
Fri Nov 8 13:29:53 2013

X-Original-To: cryptography@metzdowd.com
Date: Fri, 8 Nov 2013 10:16:13 -0800
From: Phillip Hallam-Baker <hallam@gmail.com>
To: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

--===============3298966033684798174==
Content-Type: multipart/alternative; boundary=001a1132f26aa649fa04eaae608e

--001a1132f26aa649fa04eaae608e
Content-Type: text/plain; charset=ISO-8859-1

Instructive reading:

http://www.reuters.com/article/2013/11/08/net-us-usa-security-snowden-idUSBRE9A703020131108


It occurs to me that Snowden could have done the same thing armed with just
a smartphone.

1) He loads a custom app onto the phone that monitors the microphone in the
background and performs acoustic keystroke snooping.

2) Goes over to the person and asks them to type a bunch of text while he
is close, at some point they are asked to enter their password while he
looks the other way.

3) Profit!


-- 
Website: http://hallambaker.com/

--001a1132f26aa649fa04eaae608e
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Instructive reading:</div><div><br></div><a href=3D"h=
ttp://www.reuters.com/article/2013/11/08/net-us-usa-security-snowden-idUSBR=
E9A703020131108">http://www.reuters.com/article/2013/11/08/net-us-usa-secur=
ity-snowden-idUSBRE9A703020131108</a><br clear=3D"all">
<div><br></div><div><br></div><div>It occurs to me that Snowden could have =
done the same thing armed with just a smartphone.</div><div><br></div><div>=
1) He loads a custom app onto the phone that monitors the microphone in the=
 background and performs acoustic keystroke snooping.</div>
<div><br></div><div>2) Goes over to the person and asks them to type a bunc=
h of text while he is close, at some point they are asked to enter their pa=
ssword while he looks the other way.</div><div><br></div><div>3) Profit!</d=
iv>
<div><br></div><div><br></div>-- <br>Website: <a href=3D"http://hallambaker=
.com/">http://hallambaker.com/</a><br>
</div>

--001a1132f26aa649fa04eaae608e--

--===============3298966033684798174==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============3298966033684798174==--

home help back first fref pref prev next nref lref last post