[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <7f26752b0512021740x82fda52ja3d4368be0f25744@mail.gmail.com>
Date: Sat Dec 3 01:40:27 2005
From: anonymous.squirrel at gmail.com (Anonymous Squirrel)
Subject: Most common keystroke loggers?
This thread is fascinating...but a bit misguided. Consider that somone's
home computer in the US is used for their finances (e.g. Quicken), tax
returns, and other applications. Think of the wealth of identity-related
information in those applications. If the computer is compromised, the
identity-related information can be stolen without regard to tokens,
biometrics, separate USB hash creators, or any other device.
* if the home computer is 0wned, it's game over *.
Now if the computer is not 0wned, then the other controls can be very useful
in verifying identities and mitigating the risk of fraudulent transactions.
I suggest we re-evaluate the issue
_assuming_the_computer_is_not_compromised.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20051202/3c33fe8c/attachment.html
Powered by blists - more mailing lists