lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 31 Aug 2005 14:40:47 -0400
From: "Beauford, Jason" <jbeauford@...htInOnePet.com>
To: <liudieyu@...rella.name>, <bugtraq@...urityfocus.com>
Subject: RE:  secure client-side platform


Tinfoil Hat linux ..silly.  http://tinfoilhat.shmoo.com/ 

JMB

     =|   -----Original Message-----
     =|   From: liudieyu@...rella.name [mailto:liudieyu@...rella.name] 
     =|   Sent: Wednesday, August 31, 2005 8:54 AM
     =|   To: bugtraq@...urityfocus.com
     =|   Subject: secure client-side platform
     =|   
     =|   
     =|   
     =|   how to have a secure client-side platform for secret 
     =|   communication?
     =|       ... transferring and storing secret messages, 
     =|   online banking, etc
     =|   
     =|   i got some fresh ideas in mind, and would like to 
     =|   share it here:
     =|   0. watch network with sniffer, so be sure no byte is 
     =|   sent to weird destinations 1. read-only operating 
     =|   system(knoppix, etc), so every boot is a fresh start 
     =|   2. get every secret processed in memory and stored as 
     =|   encrypted in remote server
     =|   
     =|   any suggesion or fresh idea on this topic is welcome
     =|   
     =|   this document for ordinary people on the street:
     =|   http://umbrella.name/upid/trooseid
     =|   
     =|   bugtraq guys can directly go to the conclusion part:
     =|   http://umbrella.name/computer/trooseid/trooseid_online
     =|   /#conclusion
     =|   
     =|   have a nice day,
     =|   
     =|   Liu Die Yu
     =|   
     =|   


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ