>Another thing to think about:
>
>If ever there were some private pgp keys on a compromised machine, those
>pgp keys are to be considered as compromised as well.
>
>It's hard (to say the least) to crack pgp encryped data, but the private
>key is more easy (though not trivial) to break. Of course, this depends
>a lot on the quality of the pass phrase chosen.
>
>Consider the keys compromised, revoke the public key(s) and recover the
>system. Then create new pgp key pair(s).
>
>Just a thought...
>Gustav
The programs that we've seen so far have not gone after PGP keys. Only to
find other systems that can be hacked in order to build a database of machines
for possible use in the future for denial-of-service attacks. If they were
after data, or other mischief, people would have reported cleaned out
machines, etc.
MB
--
e-mail: [EMAIL PROTECTED]
Bart: Hey, why is it destroying other toys? Lisa: They must have
programmed it to eliminate the competition. Bart: You mean like
Microsoft? Lisa: Exactly. [The Simpsons - 12/18/99]
Visit - URL:http://www.vidiot.com/ (Your link to Star Trek and UPN)
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.