Mahlzeit
On Mon, May 13, 2002 at 03:43:11PM -0700, David Corcoran wrote: > 2) These attacks assume the user has not realizes they have lost their > card and has therefore not notified their helpdesk to have the card > revolked. It is possible to rent cards. > 3) These attacks require the user to very carefully remove layers from the > outside of the chip to expose the card. This is not easy - in most > cases the chip is ruined. To which recent attack do you refer? > 5) These attacks are well known - changing the power, clock to get the > card to malfunction. Heat, Cold, whatever - most do not work and the > attacker has to know alot about the card and data on it. If I wanted > to put this work to get free GSM service why not steal a credit card > and buy a phone card - at least this is less trackable.... To which recent attack do you refer? Mahlzeit endergone Zwiebeltuete *************************************************************** Unix Smart Card Developers - M.U.S.C.L.E. (Movement for the Use of Smart Cards in a Linux Environment) http://www.linuxnet.com/ To unsubscribe send an email to [EMAIL PROTECTED] with unsubscribe sclinux ***************************************************************
