> If the authentication only happens at login and all
> transactions
> entered are covered by the login, then it's even
> easier to
> send rogue transactions.
> 
> Once your browser or local system is compromised, you
> lose all control over the
> data send to the bank and what data is displayed by
> your browser.

Since this is Solaris, how would you compromise a browser? Executables wouldn't 
work, Mozilla would want to save them to disk. You could look at cookies and 
hope that the bank in question was dumb enough to give you extensive hardware 
authentication, but drop cookies in your browser cache that somebody else could 
read and use for something.

That's lots of hoping, but still no sufficient amount of data to start doing 
rogue transactions.

Although, I see where you're going with this. I can see cookies being an attack 
vector. And I have a few additional ideas.

Still, these scenarios are far removed from the original question, which tries 
to deal with PC viruses on a non-PC OS.
 
 
This message posted from opensolaris.org
_______________________________________________
opensolaris-discuss mailing list
opensolaris-discuss@opensolaris.org

Reply via email to