thank you giancarlo! sorry i hadn't known to look for inline
responses when i read your first email, which i read on my phone.
ok, so i had some trouble formally expressing an attack scenario, but
i'm glad you agree that crypto is important and underused even for
some non-casual users. actually
On 2014-04-18, alexander taylor alexander.j.tay...@jacobs.ucsd.edu wrote:
as an example, i could install
a keylogger on the machines at my school, but this takes more time
than i have, and leaves a trace that may allow me to get caught.
how long does
Em 18-04-2014 07:54, Stuart Henderson escreveu:
On 2014-04-18, alexander taylor alexander.j.tay...@jacobs.ucsd.edu wrote:
as an example, i could install
a keylogger on the machines at my school, but this takes more time
than i have, and leaves a trace
On Mon, Apr 14, 2014 at 12:28:15AM -0700, alexander taylor wrote:
The problem I'm trying to solve is that casual users [...] may not bother
creating
passphrases for their private ssh keys. [...] [T]hese keys could be
cryptographically protected under the user's Windows/Linux logon
password
On 2014-04-14 00:28, alexander taylor wrote:
I need advice on a contribution I'd like to make as part of my
research with a cryptography professor at UC San Diego. I mostly want
to know if there are any obvious practical problems with my idea.
The problem I'm trying to solve is that casual
thanks for the reply! i am trying to keep the keys safe in the
scenario whereby an attacker steals someone's computer, takes out the
hard drive, mounts it in another machine and bypasses access rights
specified by the filesystem.
On 16 April 2014 23:57, Joachim Schipper
thanks for the reply, hugo! good points. let me try to address them:
i would like to avoid any dependencies for ssh as well. maybe if the
user tries to use --protect, only then would it prompt the user to
install dependencies, such as the linux data protection service i'd
like to create, which
On 2014-04-17, alexander taylor ajxtay...@gmail.com wrote:
gnome-keyring does the trick on linux, but for the feature to be
popular and easy to use, pehaps it's better if it the solution is
cross platform / built into ssh-keygen.
The way you are talking about doing this is dependent on PAM so
Em 17-04-2014 08:05, alexander taylor escreveu:
thanks for the reply! i am trying to keep the keys safe in the
scenario whereby an attacker steals someone's computer, takes out the
hard drive, mounts it in another machine and bypasses access rights
specified by the filesystem.
If this is
I need advice on a contribution I'd like to make as part of my
research with a cryptography professor at UC San Diego. I mostly want
to know if there are any obvious practical problems with my idea.
The problem I'm trying to solve is that casual users trying to ssh
into Github or their home /
Em 14-04-2014 04:28, alexander taylor escreveu:
The problem I'm trying to solve is that casual users trying to ssh
into Github or their home / school server may not bother creating
passphrases for their private ssh keys.
This happens to be true not only with casual users. You would be
surprised
11 matches
Mail list logo