On Thu, Jan 30, 2014 at 11:48:13PM -0800, Paul R. Ramer wrote: [snip] > Just know that no one is going to attack to the cipher itself to get to your > messages. There are much easier methods such as installing a key logger. > Why beat the door down if you can open the window?
Well...that depends on the value of the information, the assets of the adversary, and the cost of failure. Passively capturing and analyzing your traffic from 1000km away offers little hope but also little risk. Active measures like remotely installing a software keylogger can be detected and resisted or undone. Active measures like installing a hardware keylogger can get the adversary shot dead in the act, or result in exposure that would be far more costly to his employers than the failure of his individual mission. I would likely agree that nobody is going to attack the cipher to get *my* secrets. Most people haven't got anything worth that much time and effort. The greatest expectation of reward probably lies in waiting for me to make a misteak. -- Mark H. Wood, Lead System Programmer [email protected] Machines should not be friendly. Machines should be obedient.
signature.asc
Description: Digital signature
_______________________________________________ Gnupg-users mailing list [email protected] http://lists.gnupg.org/mailman/listinfo/gnupg-users
