1997-09-10 - Mondex Broken

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 6fe1e9ec2288296b63affb54dd46df697d39358e23d3624e8cd245288f1a6d88
Message ID: <1.5.4.32.19970910015508.0086f57c@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-09-10 02:14:04 UTC
Raw Date: Wed, 10 Sep 1997 10:14:04 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Wed, 10 Sep 1997 10:14:04 +0800
To: cypherpunks@toad.com
Subject: Mondex Broken
Message-ID: <1.5.4.32.19970910015508.0086f57c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain



We've received from anonymous a report on breaking
Mondex's pilot system by TNO along with a confidential
1996 memo describing the break:

   TNO's Ernst Bovenlander gave some details of these 
   attacks (though he didn't mention Mondex as the target). 
   He showed an electron micrograph of a fuzed link in a 
   smartcard; while intact, this link activated a test mode in 
   which the card contents were simply dumped to the 
   serial port. The TNO attack was to bridge the link with 
   two microprobes. At the last RSA conference, Tom 
   Rowley of National Semiconductor reported a similar 
   attack on an unnamed chip using an ion beam to 
   rewrite the link .

Included is a letter from the Bank of New Zealand to 
Electronic Frontier Canada attempting to suppress 
publication of the memo.

   http://jya.com/mondex-hack.htm







Thread