Mahlzeit

On Mon, May 13, 2002 at 03:43:11PM -0700, David Corcoran wrote:
> 2) These attacks assume the user has not realizes they have lost their 
>    card and has therefore not notified their helpdesk to have the card
>    revolked.

It is possible to rent cards.

> 3) These attacks require the user to very carefully remove layers from the 
>    outside of the chip to expose the card.  This is not easy - in most 
>    cases the chip is ruined.

To which recent attack do you refer?

> 5) These attacks are well known - changing the power, clock to get the 
>    card to malfunction.  Heat, Cold, whatever - most do not work and the
>    attacker has to know alot about the card and data on it.  If I wanted
>    to put this work to get free GSM service why not steal a credit card
>    and buy a phone card - at least this is less trackable....

To which recent attack do you refer?


Mahlzeit
endergone Zwiebeltuete

***************************************************************
Unix Smart Card Developers - M.U.S.C.L.E.
(Movement for the Use of Smart Cards in a Linux Environment)
http://www.linuxnet.com/
To unsubscribe send an email to [EMAIL PROTECTED] with
unsubscribe sclinux
***************************************************************

Reply via email to