It is most likely a hoax:
http://www.boingboing.net/2005/06/16/conspiracy_theory_of.html
As to your second question. There are several options available to you
depending on your level of paranoia:
1. Run a personal firewall (assuming you can find one that doesn't have
a trojan that talks back to the manufacturer:cough: zone alarm
:cough:).
2. Monitor and review all traffic that flows from your ethernet card
using Ethereal, TCPDump or some other program.
3. Use an on-screen keyboard.
allan
On Jun 22, 2005, at 8:54 AM, Ian Grigg wrote:
A highly aspirated but otherwise normal watcher of black helicopters
asked:
Any idea if this is true?
(WockerWocker, Wed Jun 22 12:07:31 2005)
http://c0x2.de/lol/lol.html
Beats me. But what it if it was true. What's your advice to
clients?
iang
--
Advances in Financial Cryptography, Issue 1:
https://www.financialcryptography.com/mt/archives/000458.html
Daniel Nagy, On Secure Knowledge-Based Authentication
Adam Shostack, Avoiding Liability: An Alternative Route to More Secure
Products
Ian Grigg, Pareto-Secure
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to
[EMAIL PROTECTED]
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]