<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; Identity</title>
	<atom:link href="https://javacard.vetilles.com/category/miscellaneous/applications/identity/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Chip to Cloud, day 2: My personal attribute hub</title>
		<link>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-my-personal-attribute-hub/</link>
		<comments>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-my-personal-attribute-hub/#comments</comments>
		<pubDate>Thu, 20 Sep 2012 09:50:19 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identity]]></category>
		<category><![CDATA[authentication]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-my-personal-attribute-hub/</guid>
		<description><![CDATA[This is a talk by Annette Laube, from the University of Bern. It builds on Switzerland&#8217;s eID program, extending it for new uses. The idea of national eIDs is to provide electronic signatures, and to certify personal attributes taken from official documents like a passport. The SuisseID used in Switzerland is a tradtional one, in [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is a talk by Annette Laube, from the University of Bern. It builds on Switzerland&#8217;s eID program, extending it for new uses. The idea of national eIDs is to provide electronic signatures, and to certify personal attributes taken from official documents like a passport. The SuisseID used in Switzerland is a tradtional one, in which the attributes are restricted to data present on ID documents, built on a national certificate authority and associated claim assertion service. However, there is a possibility to add claim asserion services, envisioned as coming from other government entities or other official entities.</p>
<p>The motivation of myIDP is to reduce the amount of redundant data that we have to enter in various sites, especially related ot e-government, which is error-prone and leads to many validation problems. In the SuisseID, the idea is to add another claim assertion service. With myIDP, users can save data entered on e-forms that have been accepted by a service provider, for reuse in other circumstances. The idea behind it is that information that has already been accepted somewhere is more likely to be correct. Interestingly, the user has access to the recorded attributes, and can decide to remove some that she doesn&#8217;t want to be recorded.</p>
<p>MyIDP can function as an attribute provider or as a claim proxy . As an attribute provider, a service provider requests an attribute, MyIDP then asks the user to confirm the use of a recorded attribute, and signs it before to return it. As a claim proxy, the service provider request comes with a claim list request. MyIDP then returns the signed attribute together with a claim list URI, from which the service provider can download information about where the information has previously been accepted as valid, and use this information to decide how trustworthy the attribute is.</p>
<p>This project sounds really good, because once again, we are movng from hard identity to soft identity, where data is not 100% trusted but nevertheless more trusted than data entered manually. And of course, this model is very nice because, the more it is used, the more trustworthy it gets. The quality of attributes grows as they are getting used, and this is an important property.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/20/chip-to-cloud-day-2-my-personal-attribute-hub/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud, day 1: Mobile authentication</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 20:42:34 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[Moile]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/</guid>
		<description><![CDATA[Presentation from Vasco&#8217;s Nicolas Fort. Of course, the use case is about banking, since this Vasco&#8217;s stronghold. Banks have been used to interface with customers face to face in branches. 40 years ago, they added the phone, first with a human on the bank&#8217;s end, then without. They then added the ATM network to check [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Presentation from Vasco&#8217;s Nicolas Fort. Of course, the use case is about banking, since this Vasco&#8217;s stronghold. Banks have been used to interface with customers face to face in branches. 40 years ago, they added the phone, first with a human on the bank&#8217;s end, then without. They then added the ATM network to check balance. And then came internet.</p>
<p>Internet banking has now taken over as the main interface with banks, with of course a shift to mobile devices in the recent years. In the end, banking is adapting quite fast to technology, because customers expect them to move fast (if they don&#8217;t, customers can switch).</p>
<p>So, the banking ecosystem has adapted to integrate new technologies, and they do that fast. Of course, at least according to Vasco, the problem is fraud, and the solution is authentication. Vasco&#8217;s answer includes platgorm evaluation (jailbroken or not?), user evaluation (2-factor authentication), transaction evaluation (2-factor authentication again) and finally validation.</p>
<p>The next idea is to use NFC to improve 2-factor authentication, for instance to provision keys, to perform WYSIWYS checks. On the opposite, 2-factor authentication can benefit to NFC, by providing flexible authentication.</p>
<p>That all sounds interesting, but I will need a bit more technical information to undrstand what they are saying. In particular, I am always careful with solutions in which one of the 2 factors needed for authentication isnthe device on which I want to do something. This may not be very rational, bit I am not feeling good about it.</p>
<p>Of course, this presentation was a lot about advertising, and yiu can better understand where Vasco is going to by getting to <a href="http://www.mydigipass.com" class="liexternal">MyDigipass</a>. This offer sounds interesting for securing online accounts. Maybe that I will consider giving it a try.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud live, day 1: Opening panel on eID in Europe</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 09:24:41 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/</guid>
		<description><![CDATA[This is the conference formerly known as e-Smart. Apart from changing its name, the conference has also moved from Sophia Antipolis to Nice. No more bike riding from home to conference this year. However, the new setting at Acropolis is really nice, with a lot of room. To celebrate that, I have decide to attend [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is the conference formerly known as e-Smart. Apart from changing its name, the conference has also moved from Sophia Antipolis to Nice. No more bike riding from home to conference this year. However, the new setting at Acropolis is really nice, with a lot of room.</p>
<p>To celebrate that, I have decide to attend the opening session this year. We started by an enthusiastic eID spporter from European Union, promising us all regulations and standards ready for 2014, which sounds interesting. After all, there are very interesting deployment in countries like Belgium and Estonia, which could be extended.</p>
<p>Then, we get a panel, with the question below. Speakers are Christian van der Valk, from TrustWeaver, Herrmann Sterzinger, from G&#038;D, Massimo Cappelli, from Global CyberSecurity Center, and Marie Figarella, from Gemalto.</p>
<p>Why has eIAS services not been a success to date?</p>
<ul>
<li>Is it really the case? There haven&#8217;t been failures, there are many services ready to,use, and a lack of recognition, with a common perception that digital signature ismore difficult than it actually is.</li>
<li>Citizen certificates are too expensive, and the use cases are not compelling enough. Thisis changing in some places, like in Austria, where the state pays the citizen certificate.</li>
<li>Market fragmentation and lack of trust and confidence are the two main issues. They may even be linked because the fragmentation does not allow the development of global solutlons, deployed across Europe.</li>
<li>Issues have been legal and societal, not technical. Fragmentation and lacking use case are the most important,</li>
</ul>
<p>How would the new electronic identification and trust services regulation improve on this situation?</p>
<ul>
<li>Moving from directive to regulation is important</li>
<li>Making it global would be good, but also hittin some limits, in particular regarding discrepancies in privacy requirements.</li>
<li>Moving to a regulation will limit fragmentation, the scope will be larger, going beyond signatures to seals, timestamps, and more. Mobility between states will also be greatly improved. Finally, supervision should be improved.</li>
</ul>
<p>What additional key actions would be necessary to make eIAS a success?</p>
<ul>
<li>Sharing identity and authentication between public and private spheres would help. Also,aligning with the global market with help, including private support, like Adobe. Also, the recognition of non-PKI solutions would be required (that sounds interesting)</li>
<li>Moving beyond web authentication is required. Moving to global regulation loses things, such as already deployed eIDs, which do not comply to the new regulation, and also existing standads and existing profiles.</li>
<li>Bureaucratic simplification associated to eIAS would be great help. We are also missing a common framework of expertise, with collaboration between national agencies. Thereisalso a digital and cultural divide, which hurts wide adoption. Finally, including soft identity would increase the use of strong identity, if it can be used in our everyday life.</li>
<li>Associate reliable digital identity with a portable secure elemnt, to allow 2-factor authentication. Build an open and interoperale secure Internet. Privacy by design. Push digital identity on all SIM cards to benefit from NFC</li>
</ul>
<p>Now, that&#8217;s quite interesting. The views from the panelists are quite consistent. The question that puzzles me most is the relationship between national and private identity. I am left wondering what opportunities will be given to private companies and web providers to leverage this eID. Making this happen would be a great boost to eIAS.</p>
<p>I also liked Gemalto&#8217;s analysis and proposals, which was short and to the point, except the last point, of course; mandating SIM-based identity for NFC is ludicrous and pure lobbying, at least because the SIM is not the only way to access NFC.</p>
<p>So, an interesting first panel, although there haven&#8217;t been many suprises and illuminating discussions.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cloning e-passports</title>
		<link>https://javacard.vetilles.com/2006/11/20/cloning-e-passports/</link>
		<comments>https://javacard.vetilles.com/2006/11/20/cloning-e-passports/#comments</comments>
		<pubDate>Mon, 20 Nov 2006 08:55:57 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2006/11/20/cloning-e-passports/</guid>
		<description><![CDATA[Bruce Shneier has pointed to another article on the security of e-passports. This one focuses on cloning, but contrarily to a previous article, which simply mentioned that cloning was possible (which is natural, since nothing is done to avoid it), the authors now look for ways to actually exploit the cloned passports. The ideas are [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.schneier.com/blog/archives/2006/11/uk_rfid_passpor.html" class="liexternal">Bruce Shneier</a> has pointed to another article on the security of e-passports. This one focuses on cloning, but contrarily to a <a href="http://www.schneier.com/blog/archives/2006/08/hackers_clone_r.html" class="liexternal">previous article</a>, which simply mentioned that cloning was possible (which is natural, since nothing is done to avoid it), the authors now look for ways to actually exploit the cloned passports. The ideas are described in great details, but here are a few of them in a few words:</p>
<ul>
<li>If fingerprints are used, use fake fingers, in particular at automated checkpoints (which do not exist yet, but could come in the near future).</li>
<li>If pictures are used, exploit the fact that humans are imperfect. Choose a person with similar face, add/remove beard/hair, and get through customs.</li>
</ul>
<p>Interestingly enough, these two attacks are based on the fact that customs officers will trust the technology, and that they will be more relaxed if they rely on &#8220;secure passsports&#8221;.</p>
<p>There remains one major difficulty. Skimming is easy, so you can spy on an exchange at customs. However, decrypting the information isn&#8217;t as simple. The encryption key is based on public information (birth date, passport number, passport expiry date), but this information is only available in the passport itself. The authors propose several schemes to get this information, in particular schemes from anybody who has access to the passport during its production and delivery (including post office staff). Even in the case of post office employees, they know the name (on the envelope, which can lead to an estimate of the birth date) and the expiration date (roughly 10 years from now). All they miss is the passport number, which is not completely random. However, they are not sure that the picture/fingerprint of the person matches the one of the person for which a passport must be made.</p>
<p>There is another possibility of attack, which would work with people entering the United States on visa waivers (<em>i.e.</em>, those who are required to carry an electronic passport). It is based on two important facts about the handling of passports:</p>
<ul>
<li>All US visitors on visa waivers have to fill out an I-94W form every time they enter the country. The problem is that this form is very confusing, so many people have to fill out several before to succeed. US customs lines are often littered with I-94W, which include the birth date and passport numbers of people who are currently going through customs (and getting their passport data read).</li>
<li>It is of course possible to record the exchange between the passport and the reader and decipher it in the comfort of your home.</li>
</ul>
<p>So, here is a plan for getting all the information you need for making a fake passport for a friend, for instance if pictures are used as biometrics:</p>
<ol>
<li>Get in a tourist flight from a country where your look is very common.</li>
<li>If you are lucky, sit close to a person that looks like your friend. This person will fill out the I-94W during the flight. Just look at what they write (birth date and passport number).</li>
<li>If you are less lucky, get out of the flight as fast as you can, and look at people discarding I-94W forms on tables. Locate one that looks like your friend, and pick up the leftover form, or note the birth date and passport number.</li>
<li>Stay close to your victim in the line. When they pass through customs, record the exchange between their passport and the reader.</li>
<li>Back at home, try all possible expiration dates (3650 in theory, much less if you exclude week-ends, around 250 if you consider that e-passports have onyl been in use for less than a year.</li>
</ol>
<p>This all looks very, very easy. Even a bit too much to make me comfortable. Note that there are quite a few variants, depending on the passport scheme used and on the risks that you are ready to take:</p>
<ul>
<li>If fingerprints are used, things are even easier. Just pick up any I-94W form (which is littered with fingerprints from the right person) and follow that person through customs.</li>
<li>Even simpler and less risky, think at places where people show passports. It is quite common at hotels, so the accomplice could work as hotel staff, and wait patiently for a person who looks like your friend. Then, find a way to scan their passport (you may need good OCR software, since you cannot use a cusoms reader).</li>
</ul>
<p>There are probably many other ways to fool the system. But there also are a few countermeasures, against this attack and others:</p>
<ul>
<li>For individuals: consider your passport number and expiration date confidential. Never use your passport for anything else than customs; carry another fomr of id. Never discard documents with these numbers on them, especially if associated to your name.</li>
<li>For customs: consider the I-94W and other forms sensitive. Avoid piles of discarded documents on writing tables. Make sure that they are discarded neatly. Avoid other personal information than the name on the forms (all other information available on the passport could be printed by the customs officer).</li>
</ul>
<p>Such countermeasures are simple to implement for countries, but maybe not for individuals. I remember when I was much younger, how difficult it was to enter a bar in the US by showing a French Id. People would look suspiciously at it, because it is not written in english and it does not look like a US driving license. This must of course be much worse for people from another origin (japanese, arabic, or any country that does not use the roman alphabet). In that case, showing your passport is often the only solution. Too bad.</p>
<p>EDITED (22/11): Replaced name by birth date in MRZ data.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2006/11/20/cloning-e-passports/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>FIDIS study on passports</title>
		<link>https://javacard.vetilles.com/2006/11/10/fidis-study-on-passports/</link>
		<comments>https://javacard.vetilles.com/2006/11/10/fidis-study-on-passports/#comments</comments>
		<pubDate>Fri, 10 Nov 2006 17:43:31 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2006/11/10/fidis-study-on-passports/</guid>
		<description><![CDATA[As mentioned by Bruce Schneier, FIDIS, a network of excellence on identification systems, has published the Budapest Declaration that lists security issues with the current electronic passport schemes. This is a very interesting read, as it outlines many potential issues. One of them is related to the &#8220;victim identification&#8221; threat that interests me. Since the [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>As mentioned <a href="http://www.schneier.com/blog/archives/2006/11/fidis_on_rfid_p.html" class="liexternal">by Bruce Schneier</a>, FIDIS, a network of excellence on identification systems, has published the <a href="http://www.fidis.net/press-events/press-releases/budapest-declaration/" class="liexternal">Budapest Declaration</a> that lists security issues with the current electronic passport schemes. This is a very interesting read, as it outlines many potential issues.</p>
<p>One of them is related to the &#8220;victim identification&#8221; threat that interests me. Since the key used in the chip can be read from the passport, it can be read by anybody who has access to your passport. This opens the way to victim identification targeted toward a single person. The attack simply consists in listening to the authentication protocol and verifying that the victim&#8217;s <acronym title="Machine Readable Zone">MRZ</acronym> data is actually used. If it does, you have then identified the victim.</p>
<p>The requirement to read the data seems difficult. However, there are many situations in which one may need to show a passport, including the following examples:</p>
<ul>
<li>In Europe, it is common to ask for a passport in hotels.</li>
<li>In the US, some identification is often required when paying with a credit card, or when ordering a beer (if you happen to be young enough). When you are a foreigner, most clerks will look at your foreign ID&#8217;s with great suspicion, and in some cases, your passport may be your only &#8220;Photo ID.&#8221; As a conclusion, you end up showing your passport ten times a day.</li>
<li>Many companies and administrations require you to show some identification to enter their premises. As a foreigner, you foten are required to show a passport. And no, I don&#8217;t believe that security guards should be trusted more than bartenders.</li>
</ul>
<p>And of course, an attacker may have other ways to access your passport, for instance by infiltrating an insider.</p>
<p>As a final note, this attack is a difficult issue, since it is quite difficult to avoid without a shared secret, and shared secrets are not a realistic option for electronic passports.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2006/11/10/fidis-study-on-passports/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>e-passport security</title>
		<link>https://javacard.vetilles.com/2006/09/19/e-passport-security/</link>
		<comments>https://javacard.vetilles.com/2006/09/19/e-passport-security/#comments</comments>
		<pubDate>Tue, 19 Sep 2006 11:18:31 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Open issues]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2006/09/19/e-passport-security/</guid>
		<description><![CDATA[There have been several posts on Bruce Schneier&#8217;s blog about e-passports, including a recent one. Bruce&#8217;s views are interesting, and he raises interesting issues about RFID on passports. On the other hand, the comments posted on this post and related ones, show that there are lots of misunderstandings about the technology. Of course, this is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>There have been several posts on Bruce Schneier&#8217;s blog about e-passports, including <a href="http://www.schneier.com/blog/archives/2006/09/renew_your_pass.html" class="liexternal">a recent one</a>. Bruce&#8217;s views are interesting, and he raises interesting issues about RFID on passports. On the other hand, the comments posted on this post and related ones, show that there are lots of misunderstandings about the technology.</p>
<p>Of course, this is smart card technology, and it seems that, in many cases, Java Card is present behind the scenes. I would like to react on two main topics:</p>
<ul>
<li>Possible attacks on RFID passports. In particular, passport cloning, and how to identify someone&#8217;s nationality.</li>
<li>How to disable your own passport. Some people seem interested in destroying the RFID chip on their passports, and this may be possible without using a microwave.</li>
</ul>
<p>Cloning a passport is quite easy, because this is not a threat that the electronic passport defends against. Even if your passport includes access control (you must be authenticated before to read the data from the chip), the data from which the key is derived in printed on the passport. The idea is here to avoid skimming, not cloning. Therefore, in all cases, the data is readily available, and the cloning process is easy:</p>
<ul>
<li>Get the ICAO spec. The specs are all freely available. The interesting one is the description of the Logical Data Structure.</li>
<li>Using a contactless smart card reader, read the data using standard ISO7816 commands. If access control is required, you will need to compute the key.</li>
<li>Write a Java Card application that implements the ICAO spec (that is the painful part, but you may be able to find chips that implement that spec).</li>
<li>Load the application on a card, and personalize it with the data you got from the other card.</li>
</ul>
<p>Of course, this does not solve much of the problem. A cloned passport, in particular if it includes biometric data, still does not allow you to get through customs. Actually, this may already be a benefit, since it is more difficult to imitate somebody&#8217;s fingerprint than to simply look similar (since the picture is the only authentication means in classical passports).</p>
<p>About identifying someone&#8217;s nationality by skimming (without opening the passport), there are several possible leads:</p>
<ul>
<li>If the passport does not support the access control option, then there is no problem: simply read the &#8220;Issuing state&#8221; field.</li>
<li>If the passport supports access control, then authentication is required before to start reading data. There are many attacks available, but they require a complicated setup, so we won&#8217;t consider them here.</li>
<li>Another interesting lead is the initialization of the communication between the chip and the reader. The chip returns a string of bytes (ATS, Answer To Select), which contains protocol information and &#8220;historical bytes&#8221;. These bytes should be ignored by readers, but they usually contain product version information and other interesting things. Depending on these bytes, it may be possible to identify a provider, or even an issuing country. I have not tried it on a passport, but these bytes are usually quite interesting.</li>
<li>The final lead comes from the fact that there are many options in the specification. It may be possible to use this information to identify citizens of a country. A typical way to do so is to try all optional commands. This is often possible even if access control is required: the status word will be different for an unsupported command and for an &#8220;access denied&#8221; command. The same trick may allow users to identify the data layout, by examining the answers to the SELECT command.</li>
</ul>
<p>Such attacks are trivial, and they are cheap to design and implement. Anybody with the slghtest smart cad knowledge is able to design them, provided that they have access to a few passports to test them. So identifying the nationality of a passport holder does not look that difficult.</p>
<p>The main issue is here that skimming is a new issue for smart card people, and that our current basic specifications are not designed to resist to that attack. This does not mean that we can&#8217;t deend against it, but just that we need to consider it in our security requirements.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2006/09/19/e-passport-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
