howto secure older keys after the recent attacks

Christoph Anton Mitterer christoph.anton.mitterer at physik.uni-muenchen.de
Fri Sep 11 11:26:45 CEST 2009


On Thu, 2009-09-10 at 22:23 -0400, David Shaw wrote:
> Sure, but your computer vendor "could" have a relationship with the  
> NSA and put some special code in the BIOS to capture keyboard input  
> and periodically send it to a central server.  Your disk drive vendor  
> "could" keep a few extra sectors hidden from the reallocation pool,  
> and use them to store copies of things that match the byte signature  
> of a PGP key.  Your wifi AP vendor "could" have a hidden secret WPA  
> key that makes your home network available to a malicious individual  
> in control of the special secret.
This is exactly what keeps me awake at nights ;P


Chris.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3387 bytes
Desc: not available
URL: </pipermail/attachments/20090911/02838f2f/attachment.bin>


More information about the Gnupg-users mailing list