[Cryptography] Satoshi's PGP key.
amccullagh at live.com
Fri Dec 18 23:29:59 EST 2015
In 2001, the first public court case dealing with Key loggers was published. The case is SCARFO v. US. In that case, the FBI was tracking an alleged mafia member. He was using PGP to encrypt messages between him and an accomplice.
The FBI could not decrypt the message so they developed 2 malware applications or maybe 3 (not surer about this as I have not read the case for sometime). The FBI had worked out that SCARFO was using PGP so they surreptitiously loaded the first malware which basically searched for the PGP private key ring and sent the entire ring by FTP to the FBI address. The malware then deleted all traces of the transaction from SCARFO’s machine and then deleted itself.
Once the FBI had the PGP private Key ring they needed the pass phrase to activate the PGP and thus be able to decrypt all future correspondence. They did this by loading a second piece of malware which was a key-logger. The key-logger lay in wait until PGP was activated and then recorded (I think is was the next 100 characters) typed in. The key logger then packaged this information up and sent it by FTP again to FBI.
All of this information is detailed in the Affidavit of an FBI agent which can be located on the EFF site.
Now I am not sure about this but the FBI either had a third malware application or the second malware had extra functionality but every time SCARFO sent an encrypted message to his accomplice the message was also sent to the FBI.
So my question is, “is it possible for some malware to steal an entire BIT COIN wallet and copy a passphrase and then the perpetrator can spend someone else’s bitcoins”.
Just a thought.
I obviously could be naive or just do not understand how BITCOIN wallets operate.
Any assistance in this would be greatly appreciated. All of the SCARFO docs can be located at EFF.org.
Dr. Adrian McCullagh
Ph.D. LL.B.(Hons) B. App. Sc. (Computing)
Mobile 0401 646 486
E: ajmccullagh57 at gmail.com
E: amccullagh at live.com
The contents of this email are confidential between the sender and the intended recipient. If you are not the intended recipient then no rights are granted to you because of this error and as such you are requested to promptly inform the sender of the error and to promptly destroy all copies of the email in your power, possession or control. The sender reserves all rights concerning this email and its contents including any privilege, copyright and confidentiality associated with this email. Even though an email signature block has been appended to this email, and notwithstanding the Electronic Transactions Act (Qld) or the Electronic Transactions Act (Cth), the signature block does not exhibit the senders intention to be bound by an offer previously sent by the intended recipient, unless the email in its body specifically indicated that the sender hereby accepts such an offer previously sent by the intended recipient.
From: John Levine
Sent: Friday, 18 December 2015 5:28 AM
To: Cryptography Mailing List
Cc: Ray Dillinger
The cryptography mailing list
cryptography at metzdowd.com
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the cryptography