Hello Christian
I bought a cyberJack go [1] to use it with my openPGP smart card for
authentification. Since the firmware of that device is upgradeable and
is capable of saving atleast 2 GB of data, how can I be sure it is not a
security threat by saving sensitive data?
May be done an encrypted
On 27/11/13 21:15, NdK wrote:
Found:
http://www.lightbluetouchpaper.org/2006/12/24/chip-pin-terminal-playing-tetris/
Meh. They just replaced all hardware inside and only re-used the shell of the
device.
While it illustrates the point they're making in the article, it's not nearly as
cool as
Il 27/11/2013 08:36, Werner Koch ha scritto:
smart cards readers are fun to play with. IIRC, there have been
demonstrations turning the doctors health card terminals and PIN+chip
terminals into space invaders consoles.
Do you have a source for that? I'd love to see some video or so :)
On Sat, 23 Nov 2013 17:19, nb.li...@xandea.de said:
smart cards readers are fun to play with. IIRC, there have been
demonstrations turning the doctors health card terminals and PIN+chip
terminals into space invaders consoles.
Do you have a source for that? I'd love to see some video or so
Hi,
(I know this is an old thread, sorry)
Werner Koch:
On Thu, 17 Oct 2013 17:55, christian.we...@gmail.com said:
I bought a cyberJack go [1] to use it with my openPGP smart card for
This is not just a reader but an identification token with lots of
embedded and upgradable software. It
On Thu, 17 Oct 2013 17:55, christian.we...@gmail.com said:
I bought a cyberJack go [1] to use it with my openPGP smart card for
authentification. Since the firmware of that device is upgradeable and
is capable of saving atleast 2 GB of data, how can I be sure it is not a
This is not just a
Hello,
I bought a cyberJack go [1] to use it with my openPGP smart card for
authentification. Since the firmware of that device is upgradeable and
is capable of saving atleast 2 GB of data, how can I be sure it is not a
security threat by saving sensitive data?
Best regards,
Christian Weinz
[1]
Wow, that's a lot of firmware space for something that looks so
simple. Hopefully they open-source the firmware (though I suppose they
should shove unsightly decryption key absconding code in the firmware
that runs the firmware).
One could also be concerned about regular readers... there's alot of
Wow, that's a lot of firmware space for something that looks so
simple. Hopefully they open-source the firmware (though I suppose they
should shove unsightly decryption key absconding code in the firmware
that runs the firmware).
One could also be concerned about regular readers... there's alot of