[Cryptech Tech] goals / use cases
Bernd Paysan
bernd at net2o.de
Wed Jan 28 17:40:28 UTC 2015
Am Mittwoch, 28. Januar 2015, 16:30:33 schrieb Fredrik Thulin:
> This exfiltration was said to be observable by even a passive attacker
> sniffing an SSH session. Ouch.
AFAIK that was observing people typing in a password, and there, the timing
interval correlates with the keys. And SSH does not have an "accumulate all
keystrokes for a password" mode.
--
Bernd Paysan
"If you want it done right, you have to do it yourself"
http://bernd-paysan.de/
net2o ID: kQusJzA;7*?t=uy at X}1GWr!+0qqp_Cn176t4(dQ*
More information about the Tech
mailing list