lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200408060351.i763p7G04132@panix5.panix.com>
Date: Thu, 5 Aug 2004 23:51:07 -0400 (EDT)
From: Seth Breidbart <sethb@...ix.com>
To: full-disclosure@...ts.netsys.com, bugtraq@...urityfocus.com
Subject: Re: Clear text password exposure in Datakey's tokens and smartcards


"Kevin Sheldrake" <kev@...ctriccat.co.uk> wrote:

> Ignoring the initial expense for a moment, wouldn't it have made a
> lot of sense to include the keypad actually on the cards?
> Obviously, card readers would need to be contructed such that the
> keypad part of the card would be exposed during use.

No, they wouldn't.  The card could remember the key typed on it for,
say, 60 seconds.

Seth

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ