howto secure older keys after the recent attacks
Christoph Anton Mitterer
christoph.anton.mitterer at physik.uni-muenchen.de
Fri Sep 11 11:26:45 CEST 2009
On Thu, 2009-09-10 at 22:23 -0400, David Shaw wrote:
> Sure, but your computer vendor "could" have a relationship with the
> NSA and put some special code in the BIOS to capture keyboard input
> and periodically send it to a central server. Your disk drive vendor
> "could" keep a few extra sectors hidden from the reallocation pool,
> and use them to store copies of things that match the byte signature
> of a PGP key. Your wifi AP vendor "could" have a hidden secret WPA
> key that makes your home network available to a malicious individual
> in control of the special secret.
This is exactly what keeps me awake at nights ;P
Chris.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3387 bytes
Desc: not available
URL: </pipermail/attachments/20090911/02838f2f/attachment.bin>
More information about the Gnupg-users
mailing list