How vulnerable is my Veracrypt-protected data to key logging attack via Windows?

Objective
I’ve come into possession of some data that I’d like to protect. If an attacker destroys or corrupts my data, I can tolerate that; Plenty of backups exist. But I can’t tolerate an outsider reading the data.
My hypothetical attack… Continue reading How vulnerable is my Veracrypt-protected data to key logging attack via Windows?

Using low level keyboard windows hook to read key presses & still being ‘trusted’ [migrated]

I am developing software for my client.
The software is a game controller configuration and enhancement software that runs on Windows machines.
I needed a feature to map keyboard keypresses to controller buttons. I found that Windows has a… Continue reading Using low level keyboard windows hook to read key presses & still being ‘trusted’ [migrated]

Surreptitiously surveil a logged out laptop AD workstation’s keyboard with temporary physical access?

I can think of multiple ways to surveil a logged out computer with temporary physical access. The first is installing a hardware keylogger which would enable one to get all the keystrokes from it; however, hardware keyloggers on laptops ar… Continue reading Surreptitiously surveil a logged out laptop AD workstation’s keyboard with temporary physical access?

What are the risks of reusing the same passphrase for FDE, user account, and password manager?

Consider a home user who runs Linux on a laptop with full-disk encryption and uses a cloud-based password manager. Assume the laptop is firewall-protected with no SSH access. It seems reasonable to reuse the same passphrase for the OS user… Continue reading What are the risks of reusing the same passphrase for FDE, user account, and password manager?