From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-bw0-f217.google.com (mail-bw0-f217.google.com [209.85.218.217]) by mail.saout.de (Postfix) with ESMTP for ; Mon, 12 Apr 2010 19:49:29 +0200 (CEST) Received: by bwz9 with SMTP id 9so4855608bwz.29 for ; Mon, 12 Apr 2010 10:49:29 -0700 (PDT) Sender: Richard Zidlicky Date: Mon, 12 Apr 2010 19:51:50 +0200 From: Richard Zidlicky Message-ID: <20100412175150.GA15644@linux-m68k.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Subject: Re: [dm-crypt] avoid keyloggers: enter password with mouse (virtual keyboard) List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Olivier Sessink Cc: dm-crypt@saout.de On Mon, Apr 12, 2010 at 05:10:13PM +0200, Olivier Sessink wrote: > Hi all, > > several disk encryption products feature a virtual keyboard, so users > can use the mouse to enter the password which makes keyloggers > useless. it does not make keyloggers useless, only requires slightly different manipulation to the system. You get the best safety if you have encrypted root and swap and boot off a CD which contains your kernel and ramdisk. There is no keylogger unless you did burn it on the CD. Guaranteeing the integrity of the boot media is extremely important and afaics only physical security of the media helps here. Richard