I think that even that can be a problem. For example, the computer's
BIOS may be compromised [1] or that the hardware itself is compromised
(hardware keystroke logger) [2].

As other said before, if the system is compromised, then assume that
anything you do on it can be leaked.

[1] 
http://www.securelist.com/en/analysis/204792193/MYBIOS_Is_BIOS_infection_a_reality
and 
http://www.toucan-system.com/research/blackhat2012_brossard_hardware_backdooring.pdf

[2] This one might be harder to notice
http://www.keelog.com/hardware_keyboard_logger2.html


On Fri, Dec 21, 2012 at 9:05 AM, gold flake <[email protected]> wrote:
> That said, the better and possibly fool proof method would be to boot
> up from removable media with a locked-down/stripped-down OS, do your
> business and get off the net.
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to