Now this might matter. If there's a phone line near the surveilled computer, then no blackbag op is necessary. Thus, "fishing" is much easier. If they've got to roll the trucks, then they'll probably need to have something fairly concrete to nail you with.

-TD



From: John Kelsey <[EMAIL PROTECTED]>
Reply-To: John Kelsey <[EMAIL PROTECTED]>
To: "J.A. Terranson" <[EMAIL PROTECTED]>, "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
Subject: Re: Tyler's Education
Date: Tue, 6 Jul 2004 09:32:19 -0400 (GMT-04:00)


 From: "J.A. Terranson" <[EMAIL PROTECTED]>
 Sent: Jul 4, 2004 12:57 AM
 To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
 Subject: Re: Tyler's Education

 Interestingly, I have had more than one report of aural acquistion of
 typists keystrokes being used to attempt to calculate the content of a
 short keysequence (I assume a password is what was meant by "short
 keysequence").  These reports indicated "poor, but occasionally lucky
 results".

I wonder if this follows the technique used by Song, Wagner, & Tian to attack SSH-encrypted passwords by watching keystroke timings.

 J.A. Terranson
 [EMAIL PROTECTED]

--John Kelsey


_________________________________________________________________
MSN Life Events gives you the tips and tools to handle the turning points in your life. http://lifeevents.msn.com




Reply via email to