From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.saout.de ([127.0.0.1]) by localhost (mail.saout.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OnzV1KbG7i-B for ; Wed, 30 Nov 2011 15:28:16 +0100 (CET) Received: from mail-vw0-f50.google.com (mail-vw0-f50.google.com [209.85.212.50]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by mail.saout.de (Postfix) with ESMTPS for ; Wed, 30 Nov 2011 15:28:16 +0100 (CET) Received: by vbbey12 with SMTP id ey12so440451vbb.37 for ; Wed, 30 Nov 2011 06:28:15 -0800 (PST) MIME-Version: 1.0 In-Reply-To: References: <20100412171540.GA3138@tansi.org> <20100412175856.GA12353@fancy-poultry.org> <20100413154850.GA19142@tansi.org> <20100413193831.GA8772@fancy-poultry.org> <4BC4CC14.6080408@redhat.com> <20100414153050.GA3966@tansi.org> <4BC60CB2.8030902@gmail.com> <20100414233054.GC9776@tansi.org> <20111004184809.GB3071@fancy-poultry.org> Date: Wed, 30 Nov 2011 15:28:14 +0100 Message-ID: From: Ma Begaj Content-Type: text/plain; charset=ISO-8859-1 Subject: Re: [dm-crypt] avoid keyloggers: enter password with mouse?(virtual?keyboard) List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de 2011/11/30 Ma Begaj : > 2011/10/4 Heinz Diehl : >> On 04.10.2011, Jan wrote: >> >>> You have a fully encrypted system on your USB stick like privatix >>> (see http://www.mandalka.name/privatix/index.html.en ) and you are >>> sitting in an internet cafe. There's a hardware keylogger installed >>> on that the PC you use. You lose your USB stick, maybe you even >>> forget it in the internet cafe (this happens)! >> [.....] >> >> Privacy on a machine outside of your control is a no-go. >> There are by far more options to get access to your data if >> somebody other than yourself has admin/root access to the machine >> you're using. A simple script which does a copy of anything inserted >> will do it. Or the admin himself logged in from another machine, and >> many more... > > > that is not true. two factor authorization solves this problem pretty easy. > > I am using barada on my machines for SSH and it is working pretty great. > http://barada.sourceforge.net/ s/authorization/authentication/