Em 18-04-2014 07:54, Stuart Henderson escreveu:
> On 2014-04-18, alexander taylor <alexander.j.tay...@jacobs.ucsd.edu> wrote:
>>                                         as an example, i could install
>> a keylogger on the machines at my school, but this takes more time
>> than i have, and leaves a trace that may allow me to get caught.
> how long does that really take? swap a keyboard for a similar looking
> one with a transmitter in? once installed it just needs to transmit
> via radio, so the attacker doesn't need to go back to the machine.
>
    As I mentioned, physical access means game over, pretty much always.
In the case where the user isn't using full disk encryption, you can
even bypass their security by booting off some usb disk and simply
installing a software keylogger, which will report you the keystrokes
through the internet. In this case, having the ssh key encrypted won't
help. Because the attacker will already have a copy of it, and just need
to wait the user type the password. And in this case it's even worse,
cause the user will most likely never know it was attacked.

    I believe that instead of promoting a false sense of security, we
should encourage people to think for themselves. I believe one of the
main reasons why Snowden revelations didn't spawned a major outcry
across the world, is because people tend to be lazy. And us, as
programmers, also tend to favor that behavior. I'm not saying for us to
create overly complex programs that will end up not being used. I'm just
saying that we should teach then into using the software more wisely.
Security is, and always will be, a trade-off. The more security, more
the inconvenience. But in this case of the ssh keys, I believe it's more
worth teaching people to always create then with passwords.

Cheers,

-- 
Giancarlo Razzolini
GPG: 4096R/77B981BC

Reply via email to