Re: WYTM - "but what if it was true?"

2005-06-22 Thread Ben Laurie
Allan Liska wrote: 3. Use an on-screen keyboard. For extra points, try Dasher. http://www.inference.phy.cam.ac.uk/dasher/ -- >>>ApacheCon Europe<<< http://www.apachecon.com/ http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man

Optimisation Considered Harmful

2005-06-22 Thread Ben Laurie
A brief altercation this evening with CERT over the recent hyperthread caching issues has brought something that's been simmering at the back of my brain to the forefront. The recent hyperthread/cache key recovery trick, followed by DJB's related (IMO) symmetric key recovery, and preceded by t

[Clips] Urban Legends Reference Pages: Computers (Keyboard Loggers)

2005-06-22 Thread R.A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Wed, 22 Jun 2005 14:05:46 -0400 To: Philodox Clips List <[EMAIL PROTECTED]> From: "R.A. Hettinga" <[EMAIL PROTECTED]> Subject: [Clips] Urban Legends Reference Pages: Computers (Keyboard Loggers) Reply-To: [EMAIL PROTECTED] Sen

Re: [Clips] dell keylogger

2005-06-22 Thread R.A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Wed, 22 Jun 2005 14:03:01 -0400 To: "Philodox Clips List" <[EMAIL PROTECTED]> From: "R.A. Hettinga" <[EMAIL PROTECTED]> Subject: Re: [Clips] dell keylogger Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] --- begin for

Re: WYTM - "but what if it was true?"

2005-06-22 Thread Lance James
Adam Shostack wrote: On Wed, Jun 22, 2005 at 01:54:34PM +0100, Ian Grigg wrote: | A highly aspirated but otherwise normal watcher of black helicopters asked: | | > Any idea if this is true? | > (WockerWocker, Wed Jun 22 12:07:31 2005) | > http://c0x2.de/lol/lol.html | | Beats me. But what i

Re: WYTM - "but what if it was true?"

2005-06-22 Thread Mark Allen Earnest
Ian Grigg wrote: A highly aspirated but otherwise normal watcher of black helicopters asked: Any idea if this is true? (WockerWocker, Wed Jun 22 12:07:31 2005) http://c0x2.de/lol/lol.html Beats me. But what it if it was true. What's your advice to clients? First up, it certainly is not

Re: WYTM - "but what if it was true?"

2005-06-22 Thread C. Scott Ananian
On Wed, 22 Jun 2005, Ian Grigg wrote: A highly aspirated but otherwise normal watcher of black helicopters asked: Any idea if this is true? (WockerWocker, Wed Jun 22 12:07:31 2005) http://c0x2.de/lol/lol.html googling 'dell keylogger' certainly turns up a lot of sites who insist that this

Re: massive data theft at MasterCard processor

2005-06-22 Thread Anne & Lynn Wheeler
Anne & Lynn Wheeler wrote: > so one of the AADS chip strawman suggestions for x9.59 from the 90s > http://www.garlic.com/~lynn/index.html#aads > > was the same protocol and transaction whether it was with the merchant > terminals ... or with a consumer owned pda/cellphone device (any kind of > wir

Re: WYTM - "but what if it was true?"

2005-06-22 Thread Allan Liska
It is most likely a hoax: http://www.boingboing.net/2005/06/16/conspiracy_theory_of.html As to your second question. There are several options available to you depending on your level of paranoia: 1. Run a personal firewall (assuming you can find one that doesn't have a trojan that talks ba

Re: WYTM - "but what if it was true?"

2005-06-22 Thread Adam Shostack
On Wed, Jun 22, 2005 at 01:54:34PM +0100, Ian Grigg wrote: | A highly aspirated but otherwise normal watcher of black helicopters asked: | | > Any idea if this is true? | > (WockerWocker, Wed Jun 22 12:07:31 2005) | > http://c0x2.de/lol/lol.html | | Beats me. But what it if it was true. What's

WYTM - "but what if it was true?"

2005-06-22 Thread Ian Grigg
A highly aspirated but otherwise normal watcher of black helicopters asked: > Any idea if this is true? > (WockerWocker, Wed Jun 22 12:07:31 2005) > http://c0x2.de/lol/lol.html Beats me. But what it if it was true. What's your advice to clients? iang -- Advances in Financial Cryptography, Is

[Clips] Seagate announces encrypted laptop drives

2005-06-22 Thread R.A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Wed, 22 Jun 2005 08:07:20 -0400 To: Philodox Clips List <[EMAIL PROTECTED]> From: "R.A. Hettinga" <[EMAIL PROTECTED]> Subject: [Clips] Seagate announces encrypted laptop drives Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTEC

Exploiting AES cache timing attack

2005-06-22 Thread Amir Herzberg
Steven M. Bellovin wrote: Dan Bernstein has a new cache timing attack on AES: http://cr.yp.to/antiforgery/cachetiming-20050414.pdf A question: could this be exploited by evil employee Eve in site A, whose corporation uses IP-Sec VPN tunneling between sites A and B, and which can (som

Re: AES cache timing attack

2005-06-22 Thread Jerrold Leichter
| > It's much harder to see how one could attack a session key in a properly | > implemented system the same way. You would have to inject a message into | > the ongoing session. However, if the protocol authenticates its messages, | > you'll never get any response to an injected message. At bes

Re: AES cache timing attack

2005-06-22 Thread Perry E. Metzger
Jerrold Leichter <[EMAIL PROTECTED]> writes: > Usage in first of these may be subject to Bernstein's attack. It's much > harder to see how one could attack a session key in a properly implemented > system the same way. You would have to inject a message into the ongoing > session. I gave an