On the topic of memory dumps to aquire passwords. The following link to 
http://www.elcomsoft.com/efdd.html brings a serious question of security to 
mind. I understand that PGP in an any normal application is pretty impossible 
to crack with brute force application. The problem presented by elcomsoft is 
that the encrypted data can be redily accessed through a memory dump to grab 
the keys to simply open the message or data the simple way. What have you done, 
if anything, to disable this possible means of access?

I have been waiting for someone to create just such an addon to Chrome for a 
very long time. I appreciate the effort and am hoping for your future success.

Paddy

pmacbrian@yahoo dot com
_______________________________________________

http://openpgpjs.org
Subscribe/unsubscribe: http://list.openpgpjs.org

Reply via email to