TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

sPACE Attack: Spoofing eID’s Password Authenticated Connection Establishment

27 点作者 snmx999大约 1 年前

3 条评论

lxgr大约 1 年前
Is this unexpected? When your PIN input and transaction confirmation device is untrusted, about the only thing a smart card can protect against is key exfiltration, and maybe rate limiting signature&#x2F;authentication attempts (I believe the German protocol sends trusted timestamps from the remote reader which would allow that).<p>Tapping your card and entering your PIN in a compromised app&#x2F;on a compromised device has the same (and to me expected) result as tapping it on a fraudster’s device directly and providing them the PIN.
评论 #39397447 未加载
评论 #39400274 未加载
kohlschuetter大约 1 年前
The research paper has shown the existence of a vulnerability in the German eID scheme, posing a significant risk to all services relying on the eID, especially those handling sensitive data such as insurances, banks, and government services.<p>The vulnerability has the CVE-ID CVE-2024–23674 and a CVSS rating of 9.7 (Critical)<p>A bank account has been successfully opened in the name of a victim at a major German bank.
stop50大约 1 年前
The first Attack that somewhat usable, if there there users to exploit.