What's the point of encrypting the Windows clipboard?

Discussion in 'privacy technology' started by Paul Keith, Jan 28, 2009.

Thread Status:
Not open for further replies.
  1. Paul Keith

    Paul Keith Registered Member

    Joined:
    Nov 23, 2008
    Posts:
    25
    Hi, I was just organizing my notes and found that I have bookmarked this freeware Clipboard Encryption tool for trial: https://www.wilderssecurity.com/showthread.php?t=6456

    Problem is, I don't really get it. Well, I don't get most privacy apps but I really don't get this one.
     
  2. Z32

    Z32 Registered Member

    Joined:
    Jul 20, 2008
    Posts:
    51
    What's the point of encrypting the Windows clipboard?

    This may/may not answer your question, but to the best of my knowledge, most keyloggers are capable of viewing/logging the contents of your clipboard (see example here)...which without that program you mentioned (or a similarly capable anti-keylogger), would be unencrypted & therefore leave you vulnerable if the information is sensitive or revealing.

    So in theory with clipboard encryption, all the keylogger will be able to intercept from your clipboard is encrypted data...which is useless unless the hacker/your assailant can decrypt it.

    Where it will really come in handy, IMO, is for sensitive data you might copy from docs into emails, copying passwords from a txt file (not recommended) and so on...basically, sensitive data you don't want other people to have, but you need to copy somewhere.

    It's worth noting it's only relevant for the clipboard, so a comprehensive keylogger would have many other angles to attack you from.

    I'm not an expert at all, so I hope that's of some assistance :)
     
  3. Paul Keith

    Paul Keith Registered Member

    Joined:
    Nov 23, 2008
    Posts:
    25
    Thanks, it did. The above is what baffled me most and I apologize for not stating it clearly before. I wanted to make sure I avoided a case where someone might possibly have more ideas besides using it for the clipboard and I wanted to make sure I didn't steer the question into just that.

    I guess I'm just wondering how you can truly utilize this program. It seems that if you have an encrypted clipboard, as soon as you paste it into an editor, you're already compromised and even if you bypass the keylogger, how sure are you that the PC that's been breached hasn't been compromised in other ways besides a keylogger? It seems like a losing battle.

    At the same time, it also gets me curious. This application seems to imply that if you combine this with another tool, you can theoretically James Bond your way in and out of a compromised PC. If that's true, I'd want to see someone actually test it out in real world settings and know what they did.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.