From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 6fe1e9ec2288296b63affb54dd46df697d39358e23d3624e8cd245288f1a6d88
Message ID: <1.5.4.32.19970910015508.0086f57c@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-09-10 02:14:04 UTC
Raw Date: Wed, 10 Sep 1997 10:14:04 +0800
From: John Young <jya@pipeline.com>
Date: Wed, 10 Sep 1997 10:14:04 +0800
To: cypherpunks@toad.com
Subject: Mondex Broken
Message-ID: <1.5.4.32.19970910015508.0086f57c@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
We've received from anonymous a report on breaking
Mondex's pilot system by TNO along with a confidential
1996 memo describing the break:
TNO's Ernst Bovenlander gave some details of these
attacks (though he didn't mention Mondex as the target).
He showed an electron micrograph of a fuzed link in a
smartcard; while intact, this link activated a test mode in
which the card contents were simply dumped to the
serial port. The TNO attack was to bridge the link with
two microprobes. At the last RSA conference, Tom
Rowley of National Semiconductor reported a similar
attack on an unnamed chip using an ion beam to
rewrite the link .
Included is a letter from the Bank of New Zealand to
Electronic Frontier Canada attempting to suppress
publication of the memo.
http://jya.com/mondex-hack.htm
Return to September 1997
Return to “Tim May <tcmay@got.net>”