>Another thing to think about:
>
>If ever there were some private pgp keys on a compromised machine, those
>pgp keys are to be considered as compromised as well.
>
>It's hard (to say the least) to crack pgp encryped data, but the private
>key is more easy (though not trivial) to break. Of course, this depends
>a lot on the quality of the pass phrase chosen.
>
>Consider the keys compromised, revoke the public key(s) and recover the
>system. Then create new pgp key pair(s).
>
>Just a thought...
>Gustav

The programs that we've seen so far have not gone after PGP keys.  Only to
find other systems that can be hacked in order to build a database of machines
for possible use in the future for denial-of-service attacks.  If they were
after data, or other mischief, people would have reported cleaned out
machines, etc.

MB
-- 
e-mail: [EMAIL PROTECTED]
    Bart: Hey, why is it destroying other toys?  Lisa: They must have
    programmed it to eliminate the competition.  Bart: You mean like
    Microsoft?  Lisa: Exactly.  [The Simpsons - 12/18/99]
Visit - URL:http://www.vidiot.com/  (Your link to Star Trek and UPN)


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to