lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <7f26752b0512021740x82fda52ja3d4368be0f25744@mail.gmail.com>
Date: Sat Dec  3 01:40:27 2005
From: anonymous.squirrel at gmail.com (Anonymous Squirrel)
Subject: Most common keystroke loggers?

This thread is fascinating...but a bit misguided.  Consider that somone's
home computer in the US is used for their finances (e.g. Quicken), tax
returns, and other applications.  Think of the wealth of identity-related
information in those applications.  If the computer is compromised, the
identity-related information can be stolen without regard to tokens,
biometrics, separate USB hash creators, or any other device.

* if the home computer is 0wned, it's game over *.

Now if the computer is not 0wned, then the other controls can be very useful
in verifying identities and mitigating the risk of fraudulent transactions.

I suggest we re-evaluate the issue
_assuming_the_computer_is_not_compromised.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051202/3c33fe8c/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ