On Mon, 29 October 2001, "R. A. Hettinga" wrote: [...] > The key-logger, hidden inside a computer, secretly records everything a > suspect > types on it. The device lets authorities capture passwords to unscramble data > files in otherwise-unbreakable codes.
So what happens if the application gets the passphrase from mouse clicks over a virtual keyboard displayed on the screen (maybe with layout randomly scrambled, non-standard fonts etc)? This isn't even an original idea: Nat Borenstein used it, a few years ago, in the UI for the now defunct First Virtual payment system. Enzo --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]