Transparent keyboards

Greg Sabino Mullane greg at turnstep.com
Sun Sep 4 15:23:58 CEST 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


> Once a computer or other device that needs secure access is sufficiently
> protected, it becomes cheaper for a large government agency to resort to
> bribery or torture to get the information it wants. Assuming they do not
> wish to try bribery, are you sure you want your machine that safe?

That's a silly argument. Because they are ways of obtaining your
passphrase by force, you shouldn't bother using one or take other
protective measures? Last I heard, the government of Finland was not
known for torturing its citizens.

> I assume you are using gnupg for all your correspondence with everyone. If
> you encrypt only your sensitive communications, it will be painfully obvious
> which of your e-mails to decrypt, saving the black hats a lot of trouble.

A lot of trouble in what way? Do you know of a black hat agency able to
decrypt exiting gpg-encrypted messages?

The original poster may want to check out "Tinfoil Hat Linux"[1] which has
some interesting capabilities, including an anti-keylogger measure. A
laptop or PDA with its own keyboard could be useful as well.

[1] http://tinfoilhat.shmoo.com/

- --
Greg Sabino Mullane greg at turnstep.com
PGP Key: 0x14964AC8 200509040917
http://biglumber.com/x/web?pk=2529DF6AB8F79407E94445B4BC9B906714964AC8

-----BEGIN PGP SIGNATURE-----

iD8DBQFDGvUcvJuQZxSWSsgRAuBNAJ9MyKp4Vgqb+Q1++Jlqq0u+FIxo3ACg1Gkj
WReipnoNerGwxTTCI8oeZgE=
=zyQY
-----END PGP SIGNATURE-----





More information about the Gnupg-users mailing list