On Monday 20 June 2005 12:43 am, Chris Zakelj wrote:
> Dave Feustel wrote:
> 
> >The device is obviously not new.  What *is* new is that it is being installed
> >as oem equipment inside of keyboards for HP and Dell systems and also inside
> >of  'used keyboards which can be unobtrusively switched in for older 
> >keyboards.
> >Then the companies doing the switching can secretly monitor all the 
> >keystrokes
> >of the user, picking up everything the user types.  There is no way to 
> >detect the
> >keylogger short of opening up the keyboard. Shortly I predict the keylogging
> >functiion will be incorporated into the keyboard cpu so that even opening up 
> >the
> >keyboard will not permit the presence of the logger to be detected. 
> >
> >What's new is that this functionality now comes builtin to new systems, 
> >possibly at the
> >behest of Homeland Security, which would in that case know the password 
> >needed
> >to retrieve the logged keystrokes. So far I see no defense against this 
> >spying
> >technique of password capture.
> >
> If you haven't noticed, companies (probably driven by lawyer paranoia) 
> have been becoming more and more aware of the problems associated with 
> employees misusing email.  While as a person I find this rather 
> intrusive and annoying, as an employee and (I shudder to think) 
> potential PHB in 40 years, I find nothing wrong with it.  My continued 
> employment depends, in part, on the positive public image my 
> predecessors have spent years building up, and to have it destroyed by a 
> couple of people using company resources in inappropriate ways would 
> really tick me off.  Do they have a right to see what I do at home?  
> Hell no, it's not their resources I'm using.  But when I'm at the 
> office, they've got every right, because it's their equipment, and their 
> bandwidth.

I agree.
 
> As for the "homeland security" argument, do you have any idea how much 
> raw data they'd have to sift through before coming to something 
> appearing to be a password?  This really wanders into the realm of "only 
> the criminals have something to fear", simply because monitoring every 
> computer user in the country would be a task only HAL could perform... 
> and we all know how well that turned out.

You are making fact out of fiction and also dealing with the wrong scenario.
If everyone's keystrokes are monitored by a builtin keylogger in each computer,
then the computer of any 'person of interest' is an open book to any 3-letter
agency that decides to find out what that person has on his/her computer.
This power will be widely used illegally no matter what safeguards are proposed.

Reply via email to