[EMAIL PROTECTED] wrote:
That reminds me. The first ATMs in Canada I saw at my bank were made by
IBM - and they used a formed-character printer to print the information
about the transaction on card stock media.

It was apparent to me that what they were using was exactly the right
size to be a 96-column card.

ref (including past posts mentioning los gatos lab atm machine development):
http://www.garlic.com/~lynn/2006x.html#9 Plurals and language confusion

ditto the san jose ibm credit union

offices were in the basement of bldg.12 ... they had to move out when bldg.12 
under went
seismic retrofit.

and for the heck of it and more topic drift, other posts in the pin attack 
threads
http://www.garlic.com/~lynn/2006u.html#42 New attacks on the financial PIN 
processing
http://www.garlic.com/~lynn/2006u.html#43 New attacks on the financial PIN 
processing
http://www.garlic.com/~lynn/2006u.html#47 New attacks on the financial PIN 
processing
http://www.garlic.com/~lynn/2006u.html#48 New attacks on the financial PIN 
processing
http://www.garlic.com/~lynn/2006v.html#1 New attacks on the financial PIN 
processing
http://www.garlic.com/~lynn/2006v.html#2 New attacks on the financial PIN 
processing
http://www.garlic.com/~lynn/2006v.html#33 New attacks on the financial PIN 
processing
http://www.garlic.com/~lynn/2006v.html#39 On sci.crypt: New attacks on the 
financial PIN processing
http://www.garlic.com/~lynn/2006v.html#42 On sci.crypt: New attacks on the 
financial PIN processing
http://www.garlic.com/~lynn/2006v.html#46 Patent buster for a method that 
increases password security
http://www.garlic.com/~lynn/2006v.html#49 Patent buster for a method that 
increases password security

the original post in the thread
http://www.garlic.com/~lynn/2006u.html#40 New attacks on the financial PIN 
processing

was oriented towards insiders being able to take advantage of their position to 
compromise
PIN processing.

this is different than the skimming/harvesting attacks
http://www.garlic.com/~lynn/subintegrity.html#harvest

that can be done with compromised terminals (which may involve insiders or 
outsiders) ... i.e. capture of static authentication data for replay attacks. 
traditionally this has involved magstripe cards (with or w/o PINs) ... but has 
also been used against chipcards that rely on static authentication data
http://www.garlic.com/~lynn/2006v.html#45 On sci.crypt: New attacks on the 
financial PIN processing

in some cases ... some of the chipcard implementations using static 
authentication data has made it even more attractive for the attacker doing 
skimming exploits.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to