It is most likely a hoax:

http://www.boingboing.net/2005/06/16/conspiracy_theory_of.html

As to your second question. There are several options available to you depending on your level of paranoia:

1. Run a personal firewall (assuming you can find one that doesn't have a trojan that talks back to the manufacturer:cough: zone alarm :cough:).

2. Monitor and review all traffic that flows from your ethernet card using Ethereal, TCPDump or some other program.

3. Use an on-screen keyboard.


allan


On Jun 22, 2005, at 8:54 AM, Ian Grigg wrote:

A highly aspirated but otherwise normal watcher of black helicopters asked:

Any idea if this is true?
 (WockerWocker, Wed Jun 22 12:07:31 2005)
http://c0x2.de/lol/lol.html

Beats me.  But what it if it was true.  What's your advice to
clients?

iang
--
Advances in Financial Cryptography, Issue 1:
   https://www.financialcryptography.com/mt/archives/000458.html
Daniel Nagy, On Secure Knowledge-Based Authentication
Adam Shostack, Avoiding Liability: An Alternative Route to More Secure Products
Ian Grigg, Pareto-Secure

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to