tag:blogger.com,1999:blog-7678620.post113222502845545695..comments2020-12-26T16:22:30.830+00:00Comments on Into The Machine: Rimmington Raises ConcernScribehttp://www.blogger.com/profile/08757616056135886893noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-7678620.post-1132423214972242802005-11-19T18:00:00.000+00:002005-11-19T18:00:00.000+00:00We don't know, because it isn't. I heard a ministe...We don't know, because it isn't. I heard a minister saying the other day that they would have to have access to massive computing power to get through the security systems. Hmmm. I just bought a 1Gig mempry that goes on my keyring, my phone has the computing power of a moonshot, and my car could outhink a chess grand master. Do they think the crooks will freeze their technology? I will bet here, a tenner to a toss, that before the damn things are even proeprly piloted there will machines for faking the chips.<BR/>Look at this><BR/>Bovenlander also told the Eurocrypt audience that microprobing attacks get harder when the feature size drops below one micron. However, there is a simple fix - to use a focussed ion beam to plate a nice large contact for the microprobe on each bus line. He showed a micrograph of a 0.8 micron chip treated in this way. He also related that undergraduates at Delft University routinely break smart card chips using microrprobe workstations, and as part of their assessed course work rather than as personal hacking. So it looks like the current version of Mondex (3101) can be broken by undergraduates. <<<<BR/><BR/>From http://jya.com/mondex-hack.htmThe Leadership Bloggerhttps://www.blogger.com/profile/04212273253106023958noreply@blogger.com