On Mon, 29 October 2001, "R. A. Hettinga" wrote:

[...]
> The key-logger, hidden inside a computer, secretly records everything a
> suspect
> types on it.  The device lets authorities capture passwords to unscramble data
> files in otherwise-unbreakable codes.

So what happens if the application gets the passphrase from mouse clicks over a 
virtual keyboard displayed on the screen (maybe with layout randomly scrambled, 
non-standard fonts etc)? This isn't even an original idea: Nat Borenstein used it, a 
few years ago, in the UI for the now defunct First Virtual payment system.

Enzo



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to