On 21 December 2012 15:18, Sandro Gauci <[email protected]> wrote: > I think that even that can be a problem. For example, the computer's > BIOS may be compromised [1] or that the hardware itself is compromised > (hardware keystroke logger) [2]. > > As other said before, if the system is compromised, then assume that > anything you do on it can be leaked. > > [1] > http://www.securelist.com/en/analysis/204792193/MYBIOS_Is_BIOS_infection_a_reality > and > http://www.toucan-system.com/research/blackhat2012_brossard_hardware_backdooring.pdf > > [2] This one might be harder to notice > http://www.keelog.com/hardware_keyboard_logger2.html
That is so tempting to make. Robin > > On Fri, Dec 21, 2012 at 9:05 AM, gold flake <[email protected]> wrote: >> That said, the better and possibly fool proof method would be to boot >> up from removable media with a locked-down/stripped-down OS, do your >> business and get off the net. > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
