[Cryptech Tech] goals / use cases

Bernd Paysan bernd at net2o.de
Wed Jan 28 17:40:28 UTC 2015


Am Mittwoch, 28. Januar 2015, 16:30:33 schrieb Fredrik Thulin:
> This exfiltration was said to be observable by even a passive attacker
> sniffing an SSH session. Ouch.

AFAIK that was observing people typing in a password, and there, the timing 
interval correlates with the keys.  And SSH does not have an "accumulate all 
keystrokes for a password" mode.

-- 
Bernd Paysan
"If you want it done right, you have to do it yourself"
http://bernd-paysan.de/
net2o ID: kQusJzA;7*?t=uy at X}1GWr!+0qqp_Cn176t4(dQ*



More information about the Tech mailing list