On 25/07/2011 16:45, Werner Koch wrote:

>> adversary, and the key isn't encrypted on the smart card. Then they can
>> just "read" it off, if they get hold of it. In that circumstance, you
> 
> That might be true with the v1 card which used a pretty old chip.  The
> v2 card uses a modern chip and card OS and thus the effort to read off
> the key wouldn't be worth what you will gain from it.

That is reassuring. Although, I'd be happier if I could find a technical
description of the feasibility of such an attack. But if one doesn't
exist, it doesn't exist.

-- 
Mike Cardwell https://grepular.com/  https://twitter.com/mickeyc
Professional  http://cardwellit.com/ http://linkedin.com/in/mikecardwell
PGP.mit.edu   0018461F/35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to