Well I guess Dvorak users would be safe from an attack like this until
the saboteur caught on.
Maybe the paranoid could pry out the keys everyday and use a randomized keymap.
On Monday 20 June 2005 05:28 pm, [EMAIL PROTECTED] wrote:
Someone here made referrence to 'nazis'.
http://en.wikipedia.org/wiki/Godwin's_law
In said article please note:
Quirk's exception
Intentional invocation of this so-called Nazi Clause is ineffectual.
and
Guy's corollary
man kafka (franz), or even better try man `The Trial`, then figure out
for yourself!
Ioan
On Mon, 20 Jun 2005 00:07:13 -0500, Dave Feustel wrote:
On Sunday 19 June 2005 08:51 pm, Nick Holland wrote:
Dave Feustel wrote:
http://bs.somewhere.real.not
This has nothing to do with OpenBSD.
It isn't new.
It isn't unique.
In effect, you just spammed the list, advertising someone's
You can't sell that bridge - I own it... :)
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of Rod.. Whitworth
Sent: Monday, 20 June 2005 4:26 PM
To: Dave Feustel; [EMAIL PROTECTED]; Nick Holland
Cc: misc
Subject: Re: OT: Hardware keyloggers embedded in new
On Mon, 20 Jun 2005 16:36:28 +1000, Timothy A. Napthali wrote:
You can't sell that bridge - I own it... :)
Given your office address I'd bet you are keeping a close watch to see
if I sell it again, too!
~|^
=
From the land down under: Australia.
Do we look umop apisdn from up over?
Do NOT
Dave Feustel wrote:
On Sunday 19 June 2005 08:51 pm, Nick Holland wrote:
Dave Feustel wrote:
http://www.amecisco.com/faq_hardwarekeylogger.htm#Q1
This has nothing to do with OpenBSD.
It isn't new.
It isn't unique.
In effect, you just spammed the list, advertising someone's product.
If
On Mon, Jun 20, 2005 at 12:07:13AM -0500, Dave Feustel wrote:
On Sunday 19 June 2005 08:51 pm, Nick Holland wrote:
Dave Feustel wrote:
http://www.amecisco.com/faq_hardwarekeylogger.htm#Q1
This has nothing to do with OpenBSD.
It isn't new.
It isn't unique.
In effect, you just
On Monday 20 June 2005 12:52 am, Brett Lymn wrote:
On Mon, Jun 20, 2005 at 12:06:02AM -0500, Dave Feustel wrote:
So far I see no defense against this spying
technique of password capture.
Regardless of whether they are built in or not - one possible way to
get around keyloggers
On Monday 20 June 2005 12:43 am, Chris Zakelj wrote:
Dave Feustel wrote:
The device is obviously not new. What *is* new is that it is being installed
as oem equipment inside of keyboards for HP and Dell systems and also inside
of 'used keyboards which can be unobtrusively switched in for
On Mon, Jun 20, 2005 at 07:08:18AM -0500, Dave Feustel wrote:
If one-time passwords capability is built into OpenBSD, where can I read about
how to use them?
RTFM comes to mind.
apropos otp
gives you valid pointers.
After that, I think you're a big boy, you can figure it out yourself...
On Monday 20 June 2005 12:23 am, Timothy A. Napthali wrote:
I'm fairly sure this is a hoax. I have seen this referenced several
times over the past few weeks and I have seen no evidence to indicate
and truth to the matter.
Here is a relevant link:
Dave Feustel wrote:
If you read the FAQ carefully you would note that the keylogger chip is
now being installed in oem equipment for the company marketing the keyboard.
Buying a unit off the shelf does not guarantee that there is no keylogger chip
installed in the keyboard.
No, but it does
Dave Feustel wrote:
You are making fact out of fiction and also dealing with the wrong scenario.
If everyone's keystrokes are monitored by a builtin keylogger in each computer,
then the computer of any 'person of interest' is an open book to any 3-letter
agency that decides to find out what
On Monday 20 June 2005 01:32 am, Ben Hooper wrote:
|I thought you had more insight. All of OpenBSD's security is
|at risk with
|this technology.
|
|The security features of an OS will not stop a physical attack, no
|matter how well designed. This is no different than the admin leaving
...on Mon, Jun 20, 2005 at 07:08:18AM -0500, Dave Feustel wrote:
If one-time passwords capability is built into OpenBSD, where can I read
about
how to use them?
skey(1) will start you off.
Alex.
On Mon, 20 Jun 2005 07:08:18 -0500, Dave Feustel wrote:
On Monday 20 June 2005 06:36 am, Marc Espie wrote:
On Mon, Jun 20, 2005 at 12:07:13AM -0500, Dave Feustel wrote:
On Sunday 19 June 2005 08:51 pm, Nick Holland wrote:
Dave Feustel wrote:
...on Mon, Jun 20, 2005 at 07:32:09AM -0500, Dave Feustel wrote:
One Time Passwords such as skey(1) are also good for insecure environments.
I just read the man page for skey, but I still don't quite understand
how it works. Would I use a calculator to generate a response that I
type in
On Monday 20 June 2005 07:14 am, Chris Zakelj wrote:
Dave Feustel wrote:
If you read the FAQ carefully you would note that the keylogger chip is
now being installed in oem equipment for the company marketing the keyboard.
Buying a unit off the shelf does not guarantee that there is no
On Mon, 20 Jun 2005, Dave Feustel wrote:
One Time Passwords such as skey(1) are also good for insecure environments.
Ben.
I just read the man page for skey, but I still don't quite understand
how it works. Would I use a calculator to generate a response that I
type in response to a
...on Mon, Jun 20, 2005 at 07:24:16AM -0500, Dave Feustel wrote:
Here is a relevant link:
http://www.rumormillnews.com/cgi-bin/forum.cgi?read=73190
That's just the same thing all over.
We may get to find out - see the above link which is apparently the source
material for the snopes
On Mon, 20 Jun 2005 07:32:09 -0500, Dave Feustel wrote:
On Monday 20 June 2005 01:32 am, Ben Hooper wrote:
|I thought you had more insight. All of OpenBSD's security is
|at risk with
|this technology.
|
|The security features of an OS will not stop a physical attack, no
|matter how well
On Monday, June 20, Dave Feustel wrote:
I thought you had more insight. All of OpenBSD's security is at risk with
this technology.
Nope, he has lots of insight. You on the other hand are the security
risk here... well, you were, and maybe, just maybe, if you smarten up
and realize what you
Dave Feustel [EMAIL PROTECTED] writes:
On Monday 20 June 2005 12:33 am, Chris Zakelj wrote:
Dave Feustel wrote:
I thought you had more insight. All of OpenBSD's security is at risk with
this technology.
The security features of an OS will not stop a physical attack, no
matter
On Mon, Jun 20, 2005 at 07:49:47AM -0500, Dave Feustel wrote:
I *would* like to see some pictures of a keylogger chip installed in a
keyboard.
also might be a good idea to find some pictures of the
underside of a keyboard.
phillips head screws and all...
for me, it's time to edit
On Monday 20 June 2005 08:14 am, Otto Moerbeek wrote:
On Mon, 20 Jun 2005, Dave Feustel wrote:
One Time Passwords such as skey(1) are also good for insecure
environments.
Ben.
I just read the man page for skey, but I still don't quite understand
how it works. Would I use
On Mon, 20 Jun 2005 17:45:53 +0200, Dimitry Andric
[EMAIL PROTECTED] wrote:
On 2005-06-20 at 17:00:57 Artur Grabowski wrote:
the data, nothing prevents them from installing a keylogger (surprise)
or a camera that will film the keyboard or a microphone that will
record the keyboard clicks so
On Jun 20, 2005, at 9:11 AM, Marco Peereboom wrote:
nazis
Invalid invocation! It must be a genuine, spontaneous reference.
Now you damn us to dozens more messages in this thread because we all
are now aware of the risk.
EZ
;-)
On Monday 20 June 2005 08:05 am, Alexander Bochmann wrote:
...on Mon, Jun 20, 2005 at 07:24:16AM -0500, Dave Feustel wrote:
Here is a relevant link:
http://www.rumormillnews.com/cgi-bin/forum.cgi?read=73190
That's just the same thing all over.
We may get to find out - see the
3:06 PM
To: Greg Thomas
Cc: OpenBSD-Misc
Subject: Re: OT: Hardware keyloggers embedded in new keyboards?
On Sunday 19 June 2005 07:24 pm, Greg Thomas wrote:
On 6/19/05, Dave Feustel [EMAIL PROTECTED] wrote:
http://www.amecisco.com/faq_hardwarekeylogger.htm#Q1
Why just new ones
On Monday 20 June 2005 10:43 am, Tobias Weingartner wrote:
On Monday, June 20, Dave Feustel wrote:
I just read the man page for skey, but I still don't quite understand
how it works. Would I use a calculator to generate a response that I
type in response to a challenge, or what?
Or
On Monday 20 June 2005 07:29 am, Jeremy Bowen wrote:
On Monday 20 June 2005 11:55 pm, Dave Feustel wrote:
If you read the FAQ carefully you would note that the keylogger chip is
now being installed in oem equipment for the company marketing the
keyboard. Buying a unit off the shelf does not
On Tue, 21 Jun 2005, Jeremy Bowen wrote:
Why else would anyone incorporate it in there, when a cheap Korean
manufacturer could save $5 by leaving such a device out. (Or are you
suggesting the NSA are in the business of subsidising keyboard sales :-)
Of course, at this point, I'd
On 6/19/05, Dave Feustel [EMAIL PROTECTED] wrote:
http://www.amecisco.com/faq_hardwarekeylogger.htm#Q1
Why just new ones? Do you think this device is new or something?
Greg
Dave Feustel wrote:
http://www.amecisco.com/faq_hardwarekeylogger.htm#Q1
This has nothing to do with OpenBSD.
It isn't new.
It isn't unique.
In effect, you just spammed the list, advertising someone's product.
If you are going to put totally off-topic stuff on the list, how 'bout
making it
customers for if
this were true?
See: http://www.snopes.com/computer/internet/dellbug.asp
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of Dave Feustel
Sent: Monday, 20 June 2005 3:06 PM
To: Greg Thomas
Cc: OpenBSD-Misc
Subject: Re: OT: Hardware keyloggers
Dave Feustel wrote:
The device is obviously not new. What *is* new is that it is being installed
as oem equipment inside of keyboards for HP and Dell systems and also inside
of 'used keyboards which can be unobtrusively switched in for older keyboards.
Then the companies doing the switching
37 matches
Mail list logo