On the topic of memory dumps to aquire passwords. The following link to
http://www.elcomsoft.com/efdd.html brings a serious question of security to
mind. I understand that PGP in an any normal application is pretty impossible
to crack with brute force application. The problem presented by elcomsoft is
that the encrypted data can be redily accessed through a memory dump to grab
the keys to simply open the message or data the simple way. What have you done,
if anything, to disable this possible means of access?
I have been waiting for someone to create just such an addon to Chrome for a
very long time. I appreciate the effort and am hoping for your future success.
Paddy
pmacbrian@yahoo dot com
_______________________________________________
http://openpgpjs.org
Subscribe/unsubscribe: http://list.openpgpjs.org