The following message is a courtesy copy of an article that has been posted to bit.listserv.ibm-main as well.
[EMAIL PROTECTED] (Tom Schmidt) writes: > I once heard a former CIA spook say that any POS system can be hacked from > a truck parked at the curb, if the price/value is right. (Speaking from a > previous lifetime in marketing research.) Maybe somebody built a proof-of- > concept device??? (Think: TEMPEST) re: http://www.garlic.com/~lynn/2007h.html#56 T.J. Maxx data theft worse than first reported http://www.garlic.com/~lynn/2007h.html#58 T.J. Maxx data theft worse than first reported and for more topic drift, latest news , hot of the press today Laptops And Flat Panels Now Vulnerable to Van Eck Methods http://hardware.slashdot.org/hardware/07/04/20/2048258.shtml Seeing through walls http://www.newscientist.com/blog/technology/2007/04/seeing-through-walls.html from above: Back in 1985, Wim Van Eck proved it was possible to tune into the radio emissions produced by electromagentic coils in a CRT display and then reconstruct the image. The practice became known as Van Eck Phreaking, and NATO spent a fortune making its systems invulnerable to it. It was a major part of Neal Stephenson's novel Cryptonomicon. ... snip ... so as previously noted, there are several countermeasure to evesdropping and replay attacks ... 1) make sure the attacker can't get the information, 2) scramble/encrypt, so the information is unintelligible, 3) change the paradigm (ala x9.59) so the evesdropped/harvested information is useless for replay attacks. http://www.garlic.com/~lynn/x959.html#x959 ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html