[36026] in bugtraq
Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards
daemon@ATHENA.MIT.EDU (Seth Breidbart)
Sat Aug 7 11:14:14 2004
Date: Thu, 5 Aug 2004 23:51:07 -0400 (EDT)
Message-Id: <200408060351.i763p7G04132@panix5.panix.com>
From: Seth Breidbart <sethb@panix.com>
To: full-disclosure@lists.netsys.com, bugtraq@securityfocus.com
In-reply-to: <opsb887sa5yl48zk@wintony> (kev@electriccat.co.uk)
"Kevin Sheldrake" <kev@electriccat.co.uk> wrote:
> Ignoring the initial expense for a moment, wouldn't it have made a
> lot of sense to include the keypad actually on the cards?
> Obviously, card readers would need to be contructed such that the
> keypad part of the card would be exposed during use.
No, they wouldn't. The card could remember the key typed on it for,
say, 60 seconds.
Seth