From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
To: David Mazieres <dm@amsterdam.lcs.mit.edu>
Message Hash: 26e95921eb14db31c2526bf4a7127559aa5f465a3ba7688c2f8039c40f011bd8
Message ID: <9601250134.AA00818@ch1d157nwk>
Reply To: N/A
UTC Datetime: 1996-01-26 13:26:35 UTC
Raw Date: Fri, 26 Jan 1996 21:26:35 +0800
From: Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>
Date: Fri, 26 Jan 1996 21:26:35 +0800
To: David Mazieres <dm@amsterdam.lcs.mit.edu>
Subject: Re: German home banking (fromn RISKS)
Message-ID: <9601250134.AA00818@ch1d157nwk>
MIME-Version: 1.0
Content-Type: text/plain
> Don't high speed modems transmit and receive on the same frequencies,
> using echo cancelation to decode the receive signals? Does that
> make it impossible to eavesdrop on high-speed (i.e. V32bis) modems?
No, and a lot of crackers and phone phreaks found out the hard way. You can
buy protocol analysers off-the-shelf that will give a dump of the entire
communication by just passively listening in (or possibly playing back a
recording). I have seen units that could decode all of the popular Blue Book
protocols for consumer equipment such as faxes and high-speed modems as well
as ISDN, T1, DS3, ATM, etc... Most are programmable and some are full-blown
computers running stripped down versions of Unix and can also be controlled
over the network from RealComputers. With multiple analysers and a little
custom software you could easily perform MITM attacks. The hardest part is
getting in the middle.
Modulation, comm-protocols, and compression techniques are not a replacement
for honest to goodness crypto.
andrew
Return to January 1996
Return to “Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>”
1996-01-26 (Fri, 26 Jan 1996 21:26:35 +0800) - Re: German home banking (fromn RISKS) - Andrew Loewenstern <andrew_loewenstern@il.us.swissbank.com>