Join Early Retirement Today
Reply
 
Thread Tools Display Modes
security from key-loggers
Old 05-24-2008, 10:28 AM   #1
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
Ed_The_Gypsy's Avatar
 
Join Date: Dec 2004
Location: the City of Subdued Excitement
Posts: 5,588
security from key-loggers

There has been discussing here earlier on the risk from key-loggers, particularly when globe-trotting.

I just ran across this link which may be of interest:

John Barnett's Windows XP Help and Support

I have not evaluated this software, just reporting it.

Cheers,

Gypsy
__________________
I have outlived most of the people I don't like and I am working on the rest.
Ed_The_Gypsy is offline   Reply With Quote
Join the #1 Early Retirement and Financial Independence Forum Today - It's Totally Free!

Are you planning to be financially independent as early as possible so you can live life on your own terms? Discuss successful investing strategies, asset allocation models, tax strategies and other related topics in our online forum community. Our members range from young folks just starting their journey to financial independence, military retirees and even multimillionaires. No matter where you fit in you'll find that Early-Retirement.org is a great community to join. Best of all it's totally FREE!

You are currently viewing our boards as a guest so you have limited access to our community. Please take the time to register and you will gain a lot of great new features including; the ability to participate in discussions, network with our members, see fewer ads, upload photographs, create a retirement blog, send private messages and so much, much more!

Old 05-24-2008, 11:04 AM   #2
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
cute fuzzy bunny's Avatar
 
Join Date: Dec 2003
Location: Losing my whump
Posts: 22,708
I've been reading up a little bit on some of the next wave of spy/malware. Turns out that almost everything has a little cpu and updatability of firmware these days. Even the smart battery in your laptop has a little ATmega406 cpu and some updatable firmware and can access some system resources to signal battery conditions.

With smart disk drive controllers, little limited cpu's in the keyboard controller, etc its only a matter of time before a piece of bad code can slip something into a piece of hardware in your system that would be almost completely undetectable by any operating system or virus detection product.

Its even highly plausible for the systems cpu microcode/firmware to be altered such that the cpu itself could perform logging or do damage to the system without the underlying software even being aware of the malwares presence.

It may simply be coming to the point where its almost implausible to protect yourself, and just not "going to the bad parts of town" or "associating with the wrong elements" will be the only way to largely avoid trouble.

Something like keyscrambler is great until someone puts something undetectable and invasive on your network cards firmware, run by the network cards microcontroller with full access to system memory and the disk drive or has a cpu based rootkit that says its doing something to protect you when its doing the opposite.
__________________
Be fearful when others are greedy, and greedy when others are fearful. Just another form of "buy low, sell high" for those who have trouble with things. This rule is not universal. Do not buy a 1973 Pinto because everyone else is afraid of it.
cute fuzzy bunny is offline   Reply With Quote
Old 05-24-2008, 03:26 PM   #3
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
travelover's Avatar
 
Join Date: Mar 2007
Posts: 14,328
This kind of ties in with the suspicion that chip makers may be inserting back doors into the chips themselves.

IEEE Spectrum: The Hunt for the Kill Switch

Last September, Israeli jets bombed a suspected nuclear installation in northeastern Syria. Among the many mysteries still surrounding that strike was the failure of a Syrian radar—supposedly state-of-the-art—to warn the Syrian military of the incoming assault. It wasn't long before military and technology bloggers concluded that this was an incident of electronic warfare—and not just any kind.


Post after post speculated that the commercial off-the-shelf microprocessors in the Syrian radar might have been purposely fabricated with a hidden “backdoor” inside. By sending a preprogrammed code to those chips, an unknown antagonist had disrupted the chips' function and temporarily blocked the radar.
travelover is offline   Reply With Quote
Old 05-24-2008, 04:14 PM   #4
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
Lsbcal's Avatar
 
Join Date: May 2006
Location: west coast, hi there!
Posts: 8,797
Can anyone guarantee that the OP's link is legitimate? I'm not accusing Gypsy of being dishonest at all. But since we are talking about security issues how do we know:
1) That Gypsy is not being spoofed?
2) That the link to John Barnett's site has not been compromised after the posting?
3) That John Barnett's site has not been hacked and compromised?
4) That the software is legitimate?
5) That the software is not prehaps selectively choosing victims?

I could go on but hope I've made the point that choosing your trusted source is a challenge .
Lsbcal is offline   Reply With Quote
Old 05-24-2008, 04:18 PM   #5
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
cute fuzzy bunny's Avatar
 
Join Date: Dec 2003
Location: Losing my whump
Posts: 22,708
Heyyy...are you the real lsbcal?

__________________
Be fearful when others are greedy, and greedy when others are fearful. Just another form of "buy low, sell high" for those who have trouble with things. This rule is not universal. Do not buy a 1973 Pinto because everyone else is afraid of it.
cute fuzzy bunny is offline   Reply With Quote
Old 05-24-2008, 04:29 PM   #6
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
Lsbcal's Avatar
 
Join Date: May 2006
Location: west coast, hi there!
Posts: 8,797
Quote:
Originally Posted by cute fuzzy bunny View Post
Heyyy...are you the real lsbcal?

I could be a spoof, but then why would I be saying such smart things?
Lsbcal is offline   Reply With Quote
Old 05-25-2008, 04:37 PM   #7
Moderator Emeritus
Nords's Avatar
 
Join Date: Dec 2002
Location: Oahu
Posts: 26,855
Quote:
Originally Posted by travelover View Post
Post after post speculated that the commercial off-the-shelf microprocessors in the Syrian radar might have been purposely fabricated with a hidden “backdoor” inside. By sending a preprogrammed code to those chips, an unknown antagonist had disrupted the chips' function and temporarily blocked the radar.
Way too complicated. Even Tom Clancy would be embarrassed.

I'd hesitate to credit to military infowarfare tactics or espionage anything that could also be ascribed to sleeping bored & badly-trained watchstanders...
__________________
*

Co-author (with my daughter) of “Raising Your Money-Savvy Family For Next Generation Financial Independence.”
Author of the book written on E-R.org: "The Military Guide to Financial Independence and Retirement."

I don't spend much time here— please send a PM.
Nords is offline   Reply With Quote
Old 05-25-2008, 05:05 PM   #8
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
cute fuzzy bunny's Avatar
 
Join Date: Dec 2003
Location: Losing my whump
Posts: 22,708
My guess is someone forgot to turn it back on when they were done washing the bird poop off of it.
__________________
Be fearful when others are greedy, and greedy when others are fearful. Just another form of "buy low, sell high" for those who have trouble with things. This rule is not universal. Do not buy a 1973 Pinto because everyone else is afraid of it.
cute fuzzy bunny is offline   Reply With Quote
Old 05-25-2008, 05:09 PM   #9
Thinks s/he gets paid by the post
 
Join Date: Nov 2005
Location: North of Montana
Posts: 2,768
Quote:
Originally Posted by cute fuzzy bunny View Post
I've been reading up a little bit on some of the next wave of spy/malware. Turns out that almost everything has a little cpu and updatability of firmware these days. Even the smart battery in your laptop has a little ATmega406 cpu and some updatable firmware and can access some system resources to signal battery conditions.

With smart disk drive controllers, little limited cpu's in the keyboard controller, etc its only a matter of time before a piece of bad code can slip something into a piece of hardware in your system that would be almost completely undetectable by any operating system or virus detection product.

Its even highly plausible for the systems cpu microcode/firmware to be altered such that the cpu itself could perform logging or do damage to the system without the underlying software even being aware of the malwares presence.

It may simply be coming to the point where its almost implausible to protect yourself, and just not "going to the bad parts of town" or "associating with the wrong elements" will be the only way to largely avoid trouble.

Something like keyscrambler is great until someone puts something undetectable and invasive on your network cards firmware, run by the network cards microcontroller with full access to system memory and the disk drive or has a cpu based rootkit that says its doing something to protect you when its doing the opposite.
A secure computer for you:



If only I could put a pancake tinfoil hat on it.
__________________
There are two kinds of people in the world: those who can extrapolate conclusions from insufficient data and ..
kumquat is offline   Reply With Quote
Old 05-25-2008, 05:17 PM   #10
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
cute fuzzy bunny's Avatar
 
Join Date: Dec 2003
Location: Losing my whump
Posts: 22,708
Google 'arce bad peripherals'. Or 'rutkowska blue pill red pill'
__________________
Be fearful when others are greedy, and greedy when others are fearful. Just another form of "buy low, sell high" for those who have trouble with things. This rule is not universal. Do not buy a 1973 Pinto because everyone else is afraid of it.
cute fuzzy bunny is offline   Reply With Quote
Old 05-25-2008, 05:39 PM   #11
Thinks s/he gets paid by the post
 
Join Date: Nov 2005
Location: North of Montana
Posts: 2,768
Still googling 'CFB breaks HTTPS'

Refer to messages 25 thru 27 in this thread, done it yet? Link please.
__________________
There are two kinds of people in the world: those who can extrapolate conclusions from insufficient data and ..
kumquat is offline   Reply With Quote
Old 05-25-2008, 05:44 PM   #12
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
cute fuzzy bunny's Avatar
 
Join Date: Dec 2003
Location: Losing my whump
Posts: 22,708
Hmm, most of the security guys I know like it when people hear about what can go wrong and how to protect themselves.

The good ones anyhow.

Let me know when you figure out why the DOD doesnt allow SSL for any information top secret or higher...
__________________
Be fearful when others are greedy, and greedy when others are fearful. Just another form of "buy low, sell high" for those who have trouble with things. This rule is not universal. Do not buy a 1973 Pinto because everyone else is afraid of it.
cute fuzzy bunny is offline   Reply With Quote
Old 05-25-2008, 06:57 PM   #13
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
 
Join Date: Jul 2003
Location: Kansas City
Posts: 7,968
Sooo - a bad toupe and fake mustache in an internet cafe would be a dead give away - or would it be the throw away rubber gloves worn while typing.

heh heh heh - ok so I'm not a bottle blond from Missouri with bacon breath. .

All of which begs the question - what does the ordinary smuck(aka non geek) do when he wants to pay bills(the usual suspects), do his taxes and maybe check his IRA accounts on line?

You are not paranoid if they really ARE out to get you?? - or what?
unclemick is offline   Reply With Quote
Old 05-25-2008, 07:11 PM   #14
Thinks s/he gets paid by the post
 
Join Date: Jan 2008
Posts: 2,020
Quote:
Originally Posted by kumquat View Post
Still googling 'CFB breaks HTTPS'

Refer to messages 25 thru 27 in this thread, done it yet? Link please.
I did read up on wep key cracking after that and went to a more secure scheme before not needing wireless at all and just going back to hardwire.

I'm still not concerned about SSL in general, aside from the talk about servers not being properly decomissioned before they're sold. However, there is a serious flaw in OpenSSL on Debian and all derivitives thereof... or any OpenSSL keys that have been exchanged with those distros. Debian OpenSSL Predictable PRNG Toys The recommendation is to re-encrypt anything stored with those weak SSH/SSL keys.

Anyway, boy, this is all way OT.
Marquette is offline   Reply With Quote
Old 05-25-2008, 10:17 PM   #15
Thinks s/he gets paid by the post
 
Join Date: Nov 2005
Location: North of Montana
Posts: 2,768
Quote:
Originally Posted by cute fuzzy bunny View Post
Hmm, most of the security guys I know like it when people hear about what can go wrong and how to protect themselves.

The good ones anyhow.

Let me know when you figure out why the DOD doesnt allow SSL for any information top secret or higher...

Thanks for the link.
__________________
There are two kinds of people in the world: those who can extrapolate conclusions from insufficient data and ..
kumquat is offline   Reply With Quote
Old 05-25-2008, 10:55 PM   #16
Thinks s/he gets paid by the post
 
Join Date: Jan 2008
Posts: 2,020
Ok, first, SSL 2.0 and 3.0 support multiple ciphers. The client and server will negotiate to the strongest cipher they both speak. So, to say that SSL has been broken is a misnomer, or to say that DoD doesn't allow SSL is a misnomer. In the first case, when I posted the link on OpenSSL being compromised, the issue is that the universe of randomness (2^15 'random' numbers) that's introduced into the cipher key is extremely small. As such, the keys are easily guessable. In the second case, well, I can't find anything on DoD's site about what they will or won't allow for ciphers. Failing that, I'm going off of NIST's site and their list of approved ciphers:

NIST.gov - Computer Security Division - Computer Security Resource Center

One of the more common SSL ciphers, SHA-1 (FIPS 180-1) is not on the list. SHA-1 is potentially vulnerable to a collision attack, but I'm not sure if I'd worry just yet.
Marquette is offline   Reply With Quote
Old 05-26-2008, 02:02 AM   #17
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
Ed_The_Gypsy's Avatar
 
Join Date: Dec 2004
Location: the City of Subdued Excitement
Posts: 5,588
Quote:
Can anyone guarantee that the OP's link is legitimate? I'm not accusing Gypsy of being dishonest at all. But since we are talking about security issues how do we know:
1) That Gypsy is not being spoofed?
2) That the link to John Barnett's site has not been compromised after the posting?
3) That John Barnett's site has not been hacked and compromised?
4) That the software is legitimate?
5) That the software is not prehaps selectively choosing victims?

I could go on but hope I've made the point that choosing your trusted source is a challenge .
Ya got me! I am actually a sleeper for the KGB (except they changed their phone number and I am stuck here).

Or maybe I'm the guy who put the bug in the printers that were sent to Saddam that disabled their radar in Desert Storm. I forget.

Your point is a good one. It appears to me that a number of little anti-malware software review sites are actually run by the guys whose software is top-rated on that site. It is easy to imagine constructing such a self-serving website to distribute spyware. It would be hard work, though. I have a hard time imagining someone working so hard to get into jail.
__________________
I have outlived most of the people I don't like and I am working on the rest.
Ed_The_Gypsy is offline   Reply With Quote
Old 05-26-2008, 08:31 AM   #18
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
Lsbcal's Avatar
 
Join Date: May 2006
Location: west coast, hi there!
Posts: 8,797
Quote:
Originally Posted by Ed_The_Gypsy View Post
Ya got me! I am actually a sleeper for the KGB (except they changed their phone number and I am stuck here)....
Just stick around Gypsy, Mr. Putin has a new assignment for you. 8)
Lsbcal is offline   Reply With Quote
Old 05-26-2008, 08:28 PM   #19
Give me a museum and I'll fill it. (Picasso)
Give me a forum ...
cute fuzzy bunny's Avatar
 
Join Date: Dec 2003
Location: Losing my whump
Posts: 22,708
Quote:
Originally Posted by kumquat View Post
Thanks for the link.
Here's your link:

http://i43.photobucket.com/albums/e3...kidfinger2.jpg


If I remember right, the topic was either whether it was perfectly safe to use any random internet cafe's internet to do major financial transactions or whether to use any open access point available to do the same.

Some folks said "Yeah sure! I do it all the time! Its okay!". And they also run naked across the highway with a bag over their head and nothing bad has EVER happened!!!.

Its my recommendation to do neither. No encryption or security is foolproof.

Now if you always use SSL, and you always have your updates applied, and you always have your firewall on and set right, and...and...and... :

I'm happy with people being aware of what can go wrong and to use proper safeguards and be just a little bit more careful than they need to be.

Seems you have some other agenda. In this case, its taking off with somones topic to apparently address some earlier perceived injury with no interest in educating your fellow forum members in security related matters.

Oh, and by the way, your investing related advice also sucks.
__________________
Be fearful when others are greedy, and greedy when others are fearful. Just another form of "buy low, sell high" for those who have trouble with things. This rule is not universal. Do not buy a 1973 Pinto because everyone else is afraid of it.
cute fuzzy bunny is offline   Reply With Quote
Old 05-31-2008, 04:56 PM   #20
Recycles dryer sheets
mark500's Avatar
 
Join Date: Feb 2006
Posts: 146
Type your password with extra characters in it and then use the mouse to highlight and delete the extra characters. For example, you might type passFROGword and then highlight and delete the middle four dots. Or type p1a2s3s4w5o6r7d8 and delete every other dot. A keylogger would still record all of the keystrokes that make up your password, but they'll be mixed with other unrelated keystrokes.
__________________
The inherent vice of capitalism is the unequal sharing of blessings; the inherent virtue of socialism is the equal sharing of misery.

Winston Churchill
mark500 is offline   Reply With Quote
Reply

Tags
technology

« - | Vacuum cleaners »

Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Cedar key ,florida Moemg Travel Information 8 05-11-2008 03:52 PM
Key West donheff Travel Information 17 03-09-2008 09:42 AM
Key Direct DallasGuy FIRE and Money 1 11-13-2007 01:08 AM
where not to retire: key west lazygood4nothinbum Life after FIRE 25 05-11-2007 07:43 PM
Just drop off the key, Lee, and get your self free Telly Other topics 3 06-03-2006 02:30 PM

» Quick Links

 
All times are GMT -6. The time now is 09:38 PM.
 
Powered by vBulletin® Version 3.8.8 Beta 1
Copyright ©2000 - 2024, vBulletin Solutions, Inc.