Allan Liska wrote:
3. Use an on-screen keyboard.
For extra points, try Dasher.
http://www.inference.phy.cam.ac.uk/dasher/
--
>>>ApacheCon Europe<<< http://www.apachecon.com/
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man
A brief altercation this evening with CERT over the recent hyperthread
caching issues has brought something that's been simmering at the back
of my brain to the forefront.
The recent hyperthread/cache key recovery trick, followed by DJB's
related (IMO) symmetric key recovery, and preceded by t
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Wed, 22 Jun 2005 14:05:46 -0400
To: Philodox Clips List <[EMAIL PROTECTED]>
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
Subject: [Clips] Urban Legends Reference Pages: Computers (Keyboard Loggers)
Reply-To: [EMAIL PROTECTED]
Sen
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Wed, 22 Jun 2005 14:03:01 -0400
To: "Philodox Clips List" <[EMAIL PROTECTED]>
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
Subject: Re: [Clips] dell keylogger
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
--- begin for
Adam Shostack wrote:
On Wed, Jun 22, 2005 at 01:54:34PM +0100, Ian Grigg wrote:
| A highly aspirated but otherwise normal watcher of black helicopters asked:
|
| > Any idea if this is true?
| > (WockerWocker, Wed Jun 22 12:07:31 2005)
| > http://c0x2.de/lol/lol.html
|
| Beats me. But what i
Ian Grigg wrote:
A highly aspirated but otherwise normal watcher of black helicopters asked:
Any idea if this is true?
(WockerWocker, Wed Jun 22 12:07:31 2005)
http://c0x2.de/lol/lol.html
Beats me. But what it if it was true. What's your advice to
clients?
First up, it certainly is not
On Wed, 22 Jun 2005, Ian Grigg wrote:
A highly aspirated but otherwise normal watcher of black helicopters asked:
Any idea if this is true?
(WockerWocker, Wed Jun 22 12:07:31 2005)
http://c0x2.de/lol/lol.html
googling 'dell keylogger' certainly turns up a lot of sites who insist
that this
Anne & Lynn Wheeler wrote:
> so one of the AADS chip strawman suggestions for x9.59 from the 90s
> http://www.garlic.com/~lynn/index.html#aads
>
> was the same protocol and transaction whether it was with the merchant
> terminals ... or with a consumer owned pda/cellphone device (any kind of
> wir
It is most likely a hoax:
http://www.boingboing.net/2005/06/16/conspiracy_theory_of.html
As to your second question. There are several options available to you
depending on your level of paranoia:
1. Run a personal firewall (assuming you can find one that doesn't have
a trojan that talks ba
On Wed, Jun 22, 2005 at 01:54:34PM +0100, Ian Grigg wrote:
| A highly aspirated but otherwise normal watcher of black helicopters asked:
|
| > Any idea if this is true?
| > (WockerWocker, Wed Jun 22 12:07:31 2005)
| > http://c0x2.de/lol/lol.html
|
| Beats me. But what it if it was true. What's
A highly aspirated but otherwise normal watcher of black helicopters asked:
> Any idea if this is true?
> (WockerWocker, Wed Jun 22 12:07:31 2005)
> http://c0x2.de/lol/lol.html
Beats me. But what it if it was true. What's your advice to
clients?
iang
--
Advances in Financial Cryptography, Is
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Wed, 22 Jun 2005 08:07:20 -0400
To: Philodox Clips List <[EMAIL PROTECTED]>
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
Subject: [Clips] Seagate announces encrypted laptop drives
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL PROTEC
Steven M. Bellovin wrote:
Dan Bernstein has a new cache timing attack on AES:
http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
A question: could this be exploited by evil employee Eve in site A,
whose corporation uses IP-Sec VPN tunneling between sites A and B, and
which can (som
| > It's much harder to see how one could attack a session key in a properly
| > implemented system the same way. You would have to inject a message into
| > the ongoing session. However, if the protocol authenticates its messages,
| > you'll never get any response to an injected message. At bes
Jerrold Leichter <[EMAIL PROTECTED]> writes:
> Usage in first of these may be subject to Bernstein's attack. It's much
> harder to see how one could attack a session key in a properly implemented
> system the same way. You would have to inject a message into the ongoing
> session.
I gave an
15 matches
Mail list logo