From: Michael Froomkin <froomkin@law.miami.edu>
To: cypherpunks <cypherpunks@toad.com>
Message Hash: 492a9c72b8afc34e18166d095a3d2ce25753f167b9a072f77628e392527e7a0a
Message ID: <Pine.SUN.3.91.960426114940.17586A-100000@viper.law.miami.edu>
Reply To: N/A
UTC Datetime: 1996-04-27 01:26:10 UTC
Raw Date: Sat, 27 Apr 1996 09:26:10 +0800
From: Michael Froomkin <froomkin@law.miami.edu>
Date: Sat, 27 Apr 1996 09:26:10 +0800
To: cypherpunks <cypherpunks@toad.com>
Subject: Mondex
Message-ID: <Pine.SUN.3.91.960426114940.17586A-100000@viper.law.miami.edu>
MIME-Version: 1.0
Content-Type: text/plain
Seth Godin, Presenting Digital Cash (1995) reports on p. 94:
Mondex "spent four years developing state-of-the-art protection against
reverse engineering by finding the world's best reverse engineers and
give them [sic] a shot a cracking the chip in their smart cards."
==details anyone?
Elsewhere, in the interview in the Appendix, Tim Jones admits they are
currently vulnerable to a MITM attack, but promises a fix real soon.
<>
In other Mondex news, the American Banker newspaper reports they are going
to field test a card in a British university; it will do meals, copies,
etc...
Any other Mondex news around?
A. Michael Froomkin | +1 (305) 284-4285; +1 (305) 284-6506 (fax)
Associate Professor of Law |
U. Miami School of Law | froomkin@law.miami.edu
P.O. Box 248087 | http://www.law.miami.edu/~froomkin
Coral Gables, FL 33124 USA | It's warm here.
Return to April 1996
Return to “Michael Froomkin <froomkin@law.miami.edu>”
1996-04-27 (Sat, 27 Apr 1996 09:26:10 +0800) - Mondex - Michael Froomkin <froomkin@law.miami.edu>