lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200408060351.i763p7G04132@panix5.panix.com>
From: sethb at panix.com (Seth Breidbart)
Subject: Clear text password exposure in Datakey's tokens and smartcards

"Kevin Sheldrake" <kev@...ctriccat.co.uk> wrote:

> Ignoring the initial expense for a moment, wouldn't it have made a
> lot of sense to include the keypad actually on the cards?
> Obviously, card readers would need to be contructed such that the
> keypad part of the card would be exposed during use.

No, they wouldn't.  The card could remember the key typed on it for,
say, 60 seconds.

Seth

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ