View Single Post
Old 04-25-09, 02:15 PM   #5
Seth8530
Captain
 
Join Date: Jan 2007
Location: Tennessee
Posts: 546
Downloads: 17
Uploads: 0
Default

For the record, I will let it be known, that seemingly secure protocols, are not always as secure as one might think they are. This is especially true, if the data is being transferred over a wireless network of any fashion, because there are programs in existence, they are designed to collect packets, and after 400-800K are captured, they will attempt to find two packets encrypted with the same stream cipher, and then they key can be deduced mathematically. This is only a weakness with wireless protocols that use stream ciphers as far as i know, im not so sure with block ciphers though. Don't forget any of the large number of viruses that could be rootkitted into a work computer that could open a port allowing the computer to be remotly acessed.
__________________
Seth8530 is offline   Reply With Quote