JorgeStolfi
Hero Member
*****
Offline Offline

Activity: 910
Merit: 1002



View Profile Personal Message (Offline)

Ignore
April 19, 2014, 10:17:56 AM

Do I need to tell the many ways in which the private keys of a victim can be obtained by a thief?
Please enlighten us.
OK, where do I start? You know what a 'computer' is?  A 'program'?  A 'hacker'? A 'trojan'? A 'key logger'? A 'hardware patch'? A 'memory dump'? A 'covert channel'? A 'malicious wallet software'?  A 'pseudo-pseudo-random number generator'?   A 'social engineer'? A 'disgruntled employee'? A  'naive user'?