[36026] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards

daemon@ATHENA.MIT.EDU (Seth Breidbart)
Sat Aug 7 11:14:14 2004

Date: Thu, 5 Aug 2004 23:51:07 -0400 (EDT)
Message-Id: <200408060351.i763p7G04132@panix5.panix.com>
From: Seth Breidbart <sethb@panix.com>
To: full-disclosure@lists.netsys.com, bugtraq@securityfocus.com
In-reply-to: <opsb887sa5yl48zk@wintony> (kev@electriccat.co.uk)

"Kevin Sheldrake" <kev@electriccat.co.uk> wrote:

> Ignoring the initial expense for a moment, wouldn't it have made a
> lot of sense to include the keypad actually on the cards?
> Obviously, card readers would need to be contructed such that the
> keypad part of the card would be exposed during use.

No, they wouldn't.  The card could remember the key typed on it for,
say, 60 seconds.

Seth

home help back first fref pref prev next nref lref last post