On 21 December 2012 15:18, Sandro Gauci <[email protected]> wrote:
> I think that even that can be a problem. For example, the computer's
> BIOS may be compromised [1] or that the hardware itself is compromised
> (hardware keystroke logger) [2].
>
> As other said before, if the system is compromised, then assume that
> anything you do on it can be leaked.
>
> [1] 
> http://www.securelist.com/en/analysis/204792193/MYBIOS_Is_BIOS_infection_a_reality
> and 
> http://www.toucan-system.com/research/blackhat2012_brossard_hardware_backdooring.pdf
>
> [2] This one might be harder to notice
> http://www.keelog.com/hardware_keyboard_logger2.html

That is so tempting to make.

Robin

>
> On Fri, Dec 21, 2012 at 9:05 AM, gold flake <[email protected]> wrote:
>> That said, the better and possibly fool proof method would be to boot
>> up from removable media with a locked-down/stripped-down OS, do your
>> business and get off the net.
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to