Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
 Easy,
 1. connect the USB
 2. Run the TrueCrypt (http://www.truecrypt.org/)

This is the problematic step. If you came to my computer with your USB
key and asked to install a program so that you could use your key, I
would not let you. Nor could you use it at a public facility such as a
library.



 3. Mount the un-partitioned disk (on the USB) drive.  I will be asked
 for the password in the mounting process.
 [10 seconds, so far]

 Unless the station has something that will copy the disk, while
 connected; the password by itself wouldn't help anybody (its a local
 disk, not a web application accessed by anybody with my password).

 That said, but since i always worry about key logger and such, I very
 much try to avoid using it from a PC/station I do not trust (I know
 how easy key-loggers are to deploy ;)


Really? Should I be worried? For that matter, do you have the address
of some keylogging software that I could play with in a virtual
Windows machine? I have googled just now, but I cannot find anything
that doesn't cost money. I will be responsible with it, I promise, but
in any case you might want to send a link or info off-list just in
case. Thanks.

-- 
Dotan Cohen

http://what-is-what.com
http://gibberish.co.il

___
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il


Re: Backup encryption key

2009-04-25 Thread Shahar Tamir
On Saturday 25 April 2009, 13:11, Dotan Cohen wrote:

 Really? Should I be worried? For that matter, do you have the address
 of some keylogging software that I could play with in a virtual
 Windows machine? I have googled just now, but I cannot find anything
 that doesn't cost money. I will be responsible with it, I promise, but
 in any case you might want to send a link or info off-list just in
 case. Thanks.


Try this:
http://amecisco.com/iks2000.htm
It's a limited demo version, but enough to give you an idea.

Shahar

___
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il


Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
 Try this:
 http://amecisco.com/iks2000.htm
 It's a limited demo version, but enough to give you an idea.


Thanks, Shahar. It seems that this is something that the computer
admin must install, not a portable app or something similar. So, so
long as I trust the admin (for instance, at the Technion's libraries)
I should be safe so long as I reboot before using the computer and
performing sensitive operations.

In other words, some malicious student could not get my logins by
exploiting the library computers that I do use. I would only be at
risk using internet cafes and such, where I do not trust the admins.

-- 
Dotan Cohen

http://what-is-what.com
http://gibberish.co.il

___
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il


Re: Backup encryption key

2009-04-25 Thread Shachar Shemesh

Dotan Cohen wrote:

Try this:
http://amecisco.com/iks2000.htm
It's a limited demo version, but enough to give you an idea.




Thanks, Shahar. It seems that this is something that the computer
admin must install, not a portable app or something similar. So, so
long as I trust the admin (for instance, at the Technion's libraries)
I should be safe so long as I reboot before using the computer and
performing sensitive operations.

In other words, some malicious student could not get my logins by
exploiting the library computers that I do use. I would only be at
risk using internet cafes and such, where I do not trust the admins.

  
I can write a Windows key logger in about half an hour, and I don't 
think you would need admin in order to run it (making it run in other 
people's session is another matter).


Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting Ltd.
http://www.lingnu.com

___
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il


Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
 I can write a Windows key logger in about half an hour, and I don't think
 you would need admin in order to run it (making it run in other people's
 session is another matter).


I see. Coming from the Linux world, I just figured that if it was
doable then someone had already made such a tool available. I suppose
that Rule #36 is not valid in the Windows ecosystem, where users are
expected to pay for everything.

Thanks for the info.

-- 
Dotan Cohen

http://what-is-what.com
http://gibberish.co.il

___
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il


Re: Backup encryption key

2009-04-25 Thread Dotan Cohen
 This one runs in kernel space and plants itself beneath the keyboard
 driver, so it can capture everything and is almost undetectable.

And Windows will run that as a portable app, ie, no installation
required? A malicious entity can just run that on any public computer
and collect info?

 There are numerous hardware keyloggers that require only somewhere
 to hide behind the pc.


Actually, I am aware of those. For some reason, I do not feel worried
about that, but I will start checking for good measure!

-- 
Dotan Cohen

http://what-is-what.com
http://gibberish.co.il

___
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il