home | log | search | bash | stats | wiki


Matches for ninjashogun, 1788 total results Sorted by newest | relevance

Tue Mar 18 01:13:48 UTC 2014  <BingoBoingo>   ninjashogun: I mean why not some sort of cable that might only incidentally happen to function as an antenna, for which shielding is possibly. WHy demand an active antenna throwing your bits around?

Tue Mar 18 01:13:02 UTC 2014  <ninjashogun>   BingoBoingo, however, it is absolutely doubtless that wifi protocols get roughly 100x as much security research as the usb protocol does.

Tue Mar 18 01:12:31 UTC 2014  <ninjashogun>   BingoBoingo - you are right and for this reason I probably shouldn't ahve called it an "air" gap.

Tue Mar 18 01:12:19 UTC 2014  <ninjashogun>   BingoBoingo - yes, absolutely.

Tue Mar 18 01:12:06 UTC 2014  <BingoBoingo>   ninjashogun: Doesn't Wifi violate the intent of an airgap even if there is "air" involved

Tue Mar 18 01:11:39 UTC 2014  <ninjashogun>   and I like the basic idea of not having your key on another PC.

Tue Mar 18 01:11:14 UTC 2014  <ninjashogun>   But this is not to detract from what you've done, asciilifeform (and mircea_popescu ?) Overall the device is a VERY good step.

Tue Mar 18 01:10:44 UTC 2014  <ninjashogun>   I think wifi security has more attention paid to it, yes. Even when it's broken. Many eyes make security deeper.

Tue Mar 18 01:10:07 UTC 2014  <diametric>   ninjashogun: but you do configure wifi secure? lol..

Tue Mar 18 01:09:59 UTC 2014  <ninjashogun>   I think there are a lot of unknowns over USB and it is a frequently underestimated attack vector, with very little security research being done.

Tue Mar 18 01:09:37 UTC 2014  <ninjashogun>   :) I undrestand what you're doing with the USB thing. However, I, personally, do not consider USB stacks to be very secure.

Tue Mar 18 01:09:07 UTC 2014  <ninjashogun>   I think this would be an interesting application for using one's private key without having it in one's possession.

Tue Mar 18 01:08:39 UTC 2014  <ninjashogun>   mircea_popescu, in fact it could be set to ONLY sign/encrypt/decrypt the next 1 message or 2 messages. So that it can't be stolen off someone's body, as it's in theri home and will only sign the next 2 things.

Tue Mar 18 01:08:05 UTC 2014  <ninjashogun>   mircea_popescu, Why not? assume that the other end is in the person's home. Then the wireless key is truly unusable.

Tue Mar 18 01:07:31 UTC 2014  <ninjashogun>   mircea_popescu, let me think about this.

Tue Mar 18 01:07:08 UTC 2014  <ninjashogun>   it could also come iwth storage, so that it could be used as a "wireless storage device" (thru the browser). rather than have to plug and unplug a usb stick.

Tue Mar 18 01:06:36 UTC 2014  <ninjashogun>   it would also save a connect and disconnect. And can be done unobtrusively at a computer, without having to insert a USB stick.

Tue Mar 18 01:06:23 UTC 2014  <asciilifeform>   ninjashogun: wifi. with ssl, right. troll much ?

Tue Mar 18 01:05:39 UTC 2014  <ninjashogun>   this suggestion isn't for the current version, which as a piece of hardware is great.

Tue Mar 18 01:05:31 UTC 2014  <ninjashogun>   asciilifeform, I have a suggestion for your next version. My suggestion is that the air gap with the computer be maintained, by running (a different brick) that is a wireless access point. You can connect to its wifi and use Firefox on localhost to upload and sign or upload and encrypt/decrypt files, which it would then serve back. This requires a computer with access to WIFI. However, I think in general a network stack

« Previous Page    Next Page »