<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: New Applications, New Threats, New Countermeasures</title>
	<atom:link href="http://javacard.vetilles.com/2007/09/26/new-applications-new-threats-new-countermeasures/feed/" rel="self" type="application/rss+xml" />
	<link>http://javacard.vetilles.com/2007/09/26/new-applications-new-threats-new-countermeasures/</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Thu, 18 May 2017 07:26:32 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>By: Eric VÃ©tillard</title>
		<link>http://javacard.vetilles.com/2007/09/26/new-applications-new-threats-new-countermeasures/#comment-3098</link>
		<dc:creator><![CDATA[Eric VÃ©tillard]]></dc:creator>
		<pubDate>Tue, 16 Oct 2007 03:04:47 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/2007/09/26/new-applications-new-threats-new-countermeasures/#comment-3098</guid>
		<description><![CDATA[My post may be misleading, but I don&#039;t believe in magic, and I am not saying that we should protect against unknown attacks. The only thing that I am saying is that, once we have uncovered a partial attack path, we should act upon it, or at least, think about it.

If I consider again the delegation issue, I have not identified any &quot;industrial&quot; attack based on it. Does it mean that we should not worry about allowing applications to know the origin of the command? An application that only expects some commands to come from the NFC antenna (and not from the mobile phone) should be able to perform that check, and reject commands that come from the mobile phone. If the cost is very small (as it is in that case), I really believe that this is not paranoia.]]></description>
		<content:encoded><![CDATA[<p>My post may be misleading, but I don&#8217;t believe in magic, and I am not saying that we should protect against unknown attacks. The only thing that I am saying is that, once we have uncovered a partial attack path, we should act upon it, or at least, think about it.</p>
<p>If I consider again the delegation issue, I have not identified any &#8220;industrial&#8221; attack based on it. Does it mean that we should not worry about allowing applications to know the origin of the command? An application that only expects some commands to come from the NFC antenna (and not from the mobile phone) should be able to perform that check, and reject commands that come from the mobile phone. If the cost is very small (as it is in that case), I really believe that this is not paranoia.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: lexdabear</title>
		<link>http://javacard.vetilles.com/2007/09/26/new-applications-new-threats-new-countermeasures/#comment-3094</link>
		<dc:creator><![CDATA[lexdabear]]></dc:creator>
		<pubDate>Mon, 15 Oct 2007 16:27:51 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/2007/09/26/new-applications-new-threats-new-countermeasures/#comment-3094</guid>
		<description><![CDATA[If you don&#039;t know about an attack today, it is natural not to take it into account. What is your proposal to protect unknown attacks? Is it not enough to react on the first successful attack? Otherwise we might as well get paranoid.]]></description>
		<content:encoded><![CDATA[<p>If you don&#8217;t know about an attack today, it is natural not to take it into account. What is your proposal to protect unknown attacks? Is it not enough to react on the first successful attack? Otherwise we might as well get paranoid.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
