Anne & Lynn Wheeler wrote:
recent posts mentioning some skimming threats
http://www.garlic.com/~lynn/aadsm22.htm#27 Meccano Trojans coming to
desktop near you

re:
http://www.garlic.com/~lynn#aadsm22.htm#30 Creativity and security

Trial starts on swipe-and-go card; A new smartcard could result in shorter queues in the shops
http://www.theage.com.au/news/business/trial-starts-on-swipeandgo-card/2006/04/12/1144521400790.html

the above has the quote:

"The card never leaves your hand," ... "In fact, it need not even be taken out of the wallet, and there is no chance information from the card can be skimmed, the most common form of card fraud."

... snip ...

while the earlier reference is to a situation where the crook is using their own device for extra swipes, a significant portion of skimming
involve compromised devices that harvest information
http://www.garlic.com/~lynn/subpubkey.html#harvest

as part of a normal transaction. The real issue is whether "static data" is used for authentication and therefor the infrastructure is vulnerable to any kind of skimming/harvesting/evesdropping and replay attacks.

a few recent comments about static data exploits for replay attacks
http://www.garlic.com/~lynn/aadsm22.htm#20 FraudWatch - Chip&Pin, a new tenner (USD10) http://www.garlic.com/~lynn/aadsm22.htm#40 FraudWatch - Chip&Pin, a new tenner (USD10)
http://www.garlic.com/~lynn/2006e.html#10 Caller ID "spoofing"
http://www.garlic.com/~lynn/2006e.html#30 Debit Cards HACKED now
http://www.garlic.com/~lynn/2006f.html#39 X.509 and ssh

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to