Timeline for How can I avoid my password being harvested by key loggers from internet cafes?
Current License: CC BY-SA 3.0
9 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
S Aug 16, 2011 at 23:45 | history | suggested | Mike Samuel | CC BY-SA 3.0 |
typos and grammar
|
Aug 16, 2011 at 23:29 | review | Suggested edits | |||
S Aug 16, 2011 at 23:45 | |||||
Aug 16, 2011 at 2:26 | comment | added | D.W. | Eek. Neither of StickBump's proposed solutions are secure; they are very easy to defeat, and some existing malware already does so. Do not follow this advice! It is not safe. | |
Aug 15, 2011 at 20:16 | comment | added | Andrew Neely | If the keylogger is hooking the keyboard interrupt, wouldn't it get the keys typed in the vr keyboard? | |
Aug 15, 2011 at 19:36 | comment | added | dr jimbob | I don't think they would be part of the best solution: bring hardware you can trust. I guess they can be part of the next best alternative of booting into an OS off a live cd/usb that you brought and can trust. Otherwise its a very weak layer of security, like changing your ssh port to 1022 while leaving an login/password combination of root/root valid; or thinking you are safe from MITM attacks using https without a CA signed certificate. | |
Aug 15, 2011 at 18:25 | comment | added | Diogo | As I said, this would be one "layer" of security. It is not the final solution, but i think it would be a part of it. | |
Aug 15, 2011 at 18:20 | comment | added | dr jimbob | Note, if say there was a javascript extension installed on the web browser (like lazarus) that was say recording everything entered in a html forms, neither method would work. (They would avoid hardware keyloggers). | |
Aug 15, 2011 at 18:05 | history | migrated | from superuser.com (revisions) | ||
Aug 15, 2011 at 14:08 | history | answered | Diogo | CC BY-SA 3.0 |