Yes but I was belittling the issuer domain security, and you said that if they didn't have it, people's cards would get TERMINATED and people could damage the cards, both of which can happen even with the issuer security domain (and in fact because of it).
I'm envisioning cards being used for e-commerce being wiped out by malicious programs that detect a card being inserted, and then purposely use a bogus key 15 times on the security domain. On Wed, 2009-06-17 at 13:05 -0400, Michael StJohns wrote: > At 12:51 PM 6/17/2009, Daniel Benoy wrote: > >Aren't you able to also break the card by failing to open a secure channel > >to the issuer domain a certain number of times? > > Wouldn't you think the issuer might consider that you were trying to hack the > card if that happened? There's no legitimate reason for a true end-user to > try and connect to the issuer security domain. > > > > _______________________________________________ > Muscle mailing list > [email protected] > http://lists.drizzle.com/mailman/listinfo/muscle
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Muscle mailing list [email protected] http://lists.drizzle.com/mailman/listinfo/muscle
