Quote:
Originally Posted by BustoRhymes
KPew obviously trying to screw us all. WTF is this???
BustoRhymes,
This is a pretty moot criticism. If an attacker has physical access to a machine, all bets are off, because they can just install a keylogger and log every keystroke made. Similarly if someone can exploit a vulnerability and remotely install a keylogger, they can log every key stroke made.
The point of using Pidgin is to secure your communications in transit, using the OTR (Off The Record) plugin. If you want an example of how secure OTR encrypted communications can be, here's a documented example of the United States Federal Bureau of Investigations failing to decrypt an OTR encrypted communication intercepted via a PRISM request.
https://www.youtube.com/watch?v=0SgGMj3Mf88&t=32m32s
Last edited by catsec; 05-30-2015 at 05:55 AM.