The cypherpunks list degenerated a long time ago to the point where I
have no idea why more than 500 people are still receiving it every
day.
As part of cleaning up the email system on toad.com, I plan to shut
down the cypherpunks-unedited list, which receives all the traffic
sent to [EMAIL
--- begin forwarded text
Status: U
Date: Tue, 27 Nov 2001 06:44:34 -0500
To: [EMAIL PROTECTED]
From: David Farber [EMAIL PROTECTED]
Subject: IP: Magic Lantern
Sender: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
From: Thompson, Tony [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Dave,
With
It's not just the FBI, of course. There are press reports this morning
of a new worm, Badtrans.b, that not only leaves behind a Trojan horse,
it includes a keystroke logger. Now, that particular leakage isn't a
major concern, since it emails the stolen text to an account that's now
been
Derek Atkins [EMAIL PROTECTED] writes:
Hrm, how about a worm with a built-in HTTP server that installs itself
on some non-standard port, say TCP/28462 (to pick one at random)?
Too easy to detect. Encrypt the key in some key known only to the
attacker, and start leaking little bits of it in
Jay D. Dyson writes:
On 27 Nov 2001, Derek Atkins wrote:
Hrm, how about a worm with a built-in HTTP server that installs itself
on some non-standard port, say TCP/28462 (to pick one at random)?
Craftier still, backdoor an existing service that behaves normally
until it
Adam Fields writes:
On a somewhat related note, is it
wise for the FBI to open itself up to potential lawsuits if their
software corrupts data or otherwise interferes with legitimate
business, or allows an intruder to do so undetected by utilizing the
AV-invisibility channel reserved
[EMAIL PROTECTED] wrote:
Jay D. Dyson writes:
-BEGIN PGP SIGNED MESSAGE-
On Tue, 27 Nov 2001 [EMAIL PROTECTED] wrote:
Hrm, how about a worm with a built-in HTTP server that installs itself
on some non-standard port, say TCP/28462 (to pick one at random)?
On Tue, 27 Nov 2001, Ben Laurie wrote:
Yeah right - so it sets up an outgoing connection to some webserver to
pass on the info. Firewall that.
Easy, have your firewalling software keep a list of all the connections
you allow. Each time a connection to a machine not on the list occurs it
asks
Jetico ( http://www.jetico.com/ ) has a hard disk encryption software
called BestCrypt, which can actually intercept the keystrokes at BIOS
level, get the correct keys and re-maps them to random for upper layers...
like keystroke loggers.
I'd be interested to see how the FBI horror fares with
If they only cover Windoze (which is likely) the result will be that
the criminal / paranoid / privacy freak / hacker community will just
plain migrate to another OS... Which would be good for the world,
don't you think?
When outlaws use Linux, Linux will be outlawed.
And I'm not being
10 matches
Mail list logo