I think that even that can be a problem. For example, the computer's BIOS may be compromised [1] or that the hardware itself is compromised (hardware keystroke logger) [2].
As other said before, if the system is compromised, then assume that anything you do on it can be leaked. [1] http://www.securelist.com/en/analysis/204792193/MYBIOS_Is_BIOS_infection_a_reality and http://www.toucan-system.com/research/blackhat2012_brossard_hardware_backdooring.pdf [2] This one might be harder to notice http://www.keelog.com/hardware_keyboard_logger2.html On Fri, Dec 21, 2012 at 9:05 AM, gold flake <[email protected]> wrote: > That said, the better and possibly fool proof method would be to boot > up from removable media with a locked-down/stripped-down OS, do your > business and get off the net. _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
