Re: Software license detector vans

New Message Reply About this list Date view Thread view Subject view Author view

William H. Geiger III (whgiii@invweb.net)
Wed, 18 Mar 98 09:36:28 -0500


In <350FE4DD.6358DBAA@algroup.co.uk>, on 03/18/98
   at 03:14 PM, Ben Laurie <ben@algroup.co.uk> said:

>> I see this as quite scary. Imagine a program that radiated out private
>> info, CC #'s, private PGP keys with passphrases, bank account access
>> codes. the possibilities are endless and the worse part covert.

>Surely the point is that your system already does this? They've just
>found a way to control it more accurately (both to suppress and to choose
>what it radiates).

Actually I have a system that doesn't but that's another matter. Standard
Van Eck radiation detection has been of the form of receiving the *same*
image that is displayed on the users CTR. What is being discused here is a
way to covertly broadcast information without the user ever being aware!!

>If people want to plant software on you that gives
>away such information, surely there are easier ways than doing it such
>that you also have to park an expensive detector van outside!

For an attack on a single individule it would not be practicle. Where this
kind of attack would work would be for TIS to put this code inside of all
their GAKware so if one of the all too numerious spook agencies decided to
spy on someone the software would already be in place (any doubts that the
FBI,CIA,NSA,BATF have vans to spare??)

>> Hmmmmm where is the phone number for the local copper distributor?? Time
>> to start building some Faraday cages....

>Don't forget to snip that important information leak: your Internet
>connection...

I *never* do any sensitive work on a network computer. I have a shielded
box that runs on battery power only (extra bonus points if you know why it
isn't connected to the local power grid). It's a little old and slow but
then again no one does any real work on WinBlows so it's not a problem. :)

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/esecure.html --------------------------------------------------------------- Tag-O-Matic: If at first you don't succeed, work for Microsoft.



New Message Reply About this list Date view Thread view Subject view Author view

 
All trademarks and copyrights are the property of their respective owners.

Other Directory Sites: SeekWonder | Directory Owners Forum

The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:16:05 ADT