Liste des Groupes | Revenir à s crypt |
Chris M. Thomasson wrote:Think of an offline encrypt with say, my symmetric HMAC cipher
thing. You save the ciphertext to a usb drive. Oh shit, say the
offline computer is infected with a virus, and the USB is now highly
suspect. Sigh... Alice gives the USB to Bob, key/viral exchange,
say a new key is encrypted in the ciphertext... ;^). Bob just
infected his computer with the virus before decrypt even occurs.
Now, if this is all offline, then the virus should not be able to
use the net to infect. However, it might have a keylogger and alter
your encrypted messages right after you click encrypt or something?
So, you think you encrypt the message attack at dawn. The keylogger
changes dawn to dusk -before- it gets passed into the cipher to do
its thing, so to speak...
So, offline encrypting Alice and Bob would need to be _sure_ that
their devices are _secure_, aka, no malware, ect... and for this
aspect, no internet access, wifi, bluetooth, ect, signals,... Its
in a, say a fractal cloak, so to speak. Check this out:
fractenna.com. They have them.
You see, this topic is always left out by security experts, when discussing
encryption.
For an initial set-up of an offline device it can be used once online and
to install the required programs.
Later you send/receive files with a 3,5 inch drive and disks. Their
are so loud that you can here read/write access and only have 1.4 MB
storage capacity which you can easily inspect with a disk monitor.
But you must hurry to get disks and a drive at Amazon, because when
stocks run out, I am not sure if they are re-filling.
Les messages affichés proviennent d'usenet.