Jump to content

User contributions for LogicKey

A user with 34 edits. Account created on 29 September 2010.

This account is currently blocked. (Show block details) The latest block log entry is provided below for reference:

View full log
Search for contributionsshowhide
⧼contribs-top⧽
⧼contribs-date⧽

18 October 2010

17 October 2010

16 October 2010

15 October 2010

14 October 2010

13 October 2010

12 October 2010

11 October 2010

10 October 2010

9 October 2010

8 October 2010

6 October 2010

  • 15:3815:38, 6 October 2010 diff hist −4,032 TrueCryptThe author presented this as a valid attack. Later it turned out to be a classic hoax (administrator privileges were required for the attack to work). Hoaxes are created to attract media attention.

5 October 2010

  • 14:4314:43, 5 October 2010 diff hist −4,032 TrueCryptThe author presented this as a valid attack. Later it turned out to be a classic hoax (administrator privileges were required for the attack to work). Hoaxes are created to attract media attention.

4 October 2010

  • 15:4315:43, 4 October 2010 diff hist −4,032 TrueCryptFrom the security point of view, there is no difference between External links section and other sections. Wikipedia:External_links - avoid: "malware, malicious scripts, trojan exploits".

3 October 2010

  • 15:0315:03, 3 October 2010 diff hist −4,032 TrueCryptRemoved malware. See section 'Physical security' for a malware-free description of the problem. Wikipedia:External_links - avoid: "malware, malicious scripts, trojan exploits".

2 October 2010

  • 15:4415:44, 2 October 2010 diff hist −4,032 TrueCryptAnybody could create a malware and use a related article on Wikipedia to spread it. Wikipedia:External_links - avoid: "malware, malicious scripts, trojan exploits".

1 October 2010

  • 17:1017:10, 1 October 2010 diff hist +31 TrueCryptIt is important to note that the product documentation informs the user about the risks of compromised physical security.
  • 17:0217:02, 1 October 2010 diff hist −4,032 TrueCryptThis article describes TrueCrypt. The malware is not TrueCrypt. Anybody could create a malware and use a related article on Wikipedia to spread it. The list of malware is virtually unlimited.

30 September 2010

29 September 2010

  • 15:4015:40, 29 September 2010 diff hist −3,058 TrueCryptInformation about a malware replaced by a more complex description of the risks of compromised physical security. The basic premise of a secure system is physical security.