<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; Mobile Security</title>
	<atom:link href="https://javacard.vetilles.com/category/mobile-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Uh oh, Google just stopped updating my kids&#8217; phones</title>
		<link>https://javacard.vetilles.com/2019/05/20/uh-oh-google-just-stopped-updating-my-kids-phones/</link>
		<comments>https://javacard.vetilles.com/2019/05/20/uh-oh-google-just-stopped-updating-my-kids-phones/#comments</comments>
		<pubDate>Mon, 20 May 2019 20:13:32 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26391</guid>
		<description><![CDATA[So, Google has revoked Huawei&#8217;s Android license. Huawei&#8217;s new phones won&#8217;t get any of the nice Google features like Google&#8217;s store, Gmail, and more. But also, all existing Huawei phones will stop receiving updates from Google. What? This includes my kids&#8217; Honor-branded phones, and as far as I know, a significant portion of the kids [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>So, Google has revoked Huawei&#8217;s Android license. Huawei&#8217;s new phones won&#8217;t get any of the nice Google features like Google&#8217;s store, Gmail, and more. But also, all existing Huawei phones will stop receiving updates from Google.</p>
<p>What? This includes my kids&#8217; Honor-branded phones, and as far as I know, a significant portion of the kids in their middle school, as Honor has been proposing phones with a great value for a few years, and they are popular in that population who are usually not getting the top-of-the-line models.</p>
<p>I could also have titled this blog more provocatively as &#8220;Google denies basic security to their customers,&#8221; &#8220;Donald Trump throws millions of kids in hackers&#8217; hands,&#8221; or &#8220;Evil Americans exercise extra-territorial power over people around the world.&#8221; There are plenty of opportunities here to be angry, but the problem is elsewhere.</p>
<p>There is here a trust and liability issue. When I buy an Android phone, I expect some service from the vendor, but I also expect some services from Google. In my professional life, I am battling for improving IoT security, making updates mandatory and secure, among other things. Until now, this was a battle against slackers and profiteers, but today, politics is getting in the way. If hackers benefit from this, who can be held liable? Is this just Huawei? Doesn&#8217;t Google share some responsibility for stopping their support? My kids have done nothing, for sure.</p>
<p>Most comments seem to emphasize that Google dealt a big blow to Huawei, but Google has also dealt a big blow to themselves: Huawei didn&#8217;t cut my kids&#8217; updates, Google did. This really has some consequences on the Android model: When you buy a phone with Android, you introduce a dependency between you and both the device vendor and Google, and you will be a collateral victim if their relationship turns sour. This almost sounds like Apple; when you get an iPhone, you belong to Apple, but at least, only to Apple.</p>
<p>It makes me rethink seriously my dependency on Google, so it&#8217;s time to take some strong decisions. I will switch my family streaming subscription from Google Play Music to Spotify, just to make sure that my kids still enjoy music on their unsupported phones. And if this madness continues, I will move them to Huawei&#8217;s app store as wellâ€¦ </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2019/05/20/uh-oh-google-just-stopped-updating-my-kids-phones/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SMS-based 2-factor: Good or Bad?</title>
		<link>https://javacard.vetilles.com/2016/06/30/sms-based-2-factor-good-or-bad/</link>
		<comments>https://javacard.vetilles.com/2016/06/30/sms-based-2-factor-good-or-bad/#comments</comments>
		<pubDate>Thu, 30 Jun 2016 20:04:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[mobile]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25887</guid>
		<description><![CDATA[Wired published recently an article about how SMS-based 2-factor authentication is not good. This article is making a buzz, and an article appeared on that topic in Fortune. The basis for these articles is that SMS-based authentication is not associated to something you have (your phone), but with something you are loosely associated to (your [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Wired published recently an article about how <a href="https://www.wired.com/2016/06/hey-stop-using-texts-two-factor-authentication/" class="liexternal">SMS-based 2-factor authentication is not good</a>. This article is making a buzz, and an article appeared on that topic <a href="http://fortune.com/2016/06/27/two-factor-authentication-sms-text/" class="liexternal">in Fortune</a>. The basis for these articles is that SMS-based authentication is not associated to something you have (your phone), but with something you are loosely associated to (your phone number).</p>
<p>The article demonstrates how easy it is to hijack&#8217;s someone&#8217;s phone number. And of course, once this is done, you can get the authentication SMS and get in. The article points to a solution that really makes your phone a second factor, such as the Google Authenticator application. It generates a one-time password every 30 seconds, without depending on any communication: you simply need to run the app.</p>
<p>But SMS-based second factor isn&#8217;t that bad, and it is definitely better than nothing, and Wired fails to tell us why:</p>
<ul>
<li>In the case of a big leak of a few million passwords, any second factor works to protect you against the robots who will check that the password is working before putting it for sale.</li>
<li>However, it doesn&#8217;t protect you well from that guy who is chasing <strong>YOU</strong>. In that case, the SMS is definitely easier to hack than other methods that require physical access.</li>
</ul>
<p>Unless you are famous or you are being unfriendly to hackers, it is quite unlikely that you will be targeted personally by a hacker (at least these days, this may change in a few years&#8230;).</p>
<p>So,if you are using SMS-based 2-factor authentication, you may think about other methods if they are available (<a href="https://fidoalliance.org/" class="liexternal">Fido</a> is great). But if you don&#8217;t use 2-factor authentication at all, please start by using this SMS thing, it will protect you at least against the major leaks that we are seeing these days.</p>
<p>Wondering which services you can protect with 2-factor authentication? Check <a href="https://www.linkedin.com/pulse/22-sites-where-you-should-enable-two-factor-right-now-brennen-cissp" class="liexternal">this page</a>  and realize that most of the sites you use can be protected.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2016/06/30/sms-based-2-factor-good-or-bad/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fiction (maybe): Who will refuse to break a secure element?</title>
		<link>https://javacard.vetilles.com/2016/02/19/fiction-maybe-who-will-refuse-to-break-a-secure-element/</link>
		<comments>https://javacard.vetilles.com/2016/02/19/fiction-maybe-who-will-refuse-to-break-a-secure-element/#comments</comments>
		<pubDate>Fri, 19 Feb 2016 18:44:41 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Java Card 2.x]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[logical attack]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25857</guid>
		<description><![CDATA[Apple is refusing to break an iPhone for the FBI. I believe that they are right to do so, but also that this position isn&#8217;t that easy to stand for everybody. So, here is a little fiction (well, I think it is fiction) about this. The iPhone is a secure device, so the best way [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Apple is refusing to break an iPhone for the FBI. I believe that they are right to do so, but also that this position isn&#8217;t that easy to stand for everybody. So, here is a little fiction (well, I think it is fiction) about this.</p>
<p>The iPhone is a secure device, so the best way for Apple to refuse breaking the phone is to claim that they can&#8217;t do it. Here is the story line:</p>
<ul>
<li>The iPhone includes a secure element.</li>
<li>The security code is stored and verified in the secure element.</li>
<li>The phone encryption key also is stored in the secure element.</li>
<li>In order to get that key from the secure element, the security code must be presented.</li>
<li>We don&#8217;t know how to break into the secure element, so we can&#8217;t bypass that security mechanism.</li>
</ul>
<p>It is a bit technical, but it is true from the point of view of Apple and &#8220;standard&#8221; developers. But the last statement (we don&#8217;t know how to break into the secure element) may not work for everybody.</p>
<p>First, regardless of the secure element, physical attacks are feasible, and there are many kinds. Some of them, like power analysis, do not even require to destroy the chip in any way. Of course, many such attacks will require &#8220;opening&#8221; the secure element to expose the chip and do other things that may destroy it. In the case of the FBI, who wants to attack a single chip that they must not destroy, this is not really nice.</p>
<p>Then, the secure element on the iPhone is most likely based on Java Card. This means that it is possible to load applications on it. Of course, Java Card includes security measures, so the application needs to be a malicious one; well, there are malicious applications around, and here, we are working with software. This makes a big difference. Now, here is the checklist for FBI:</p>
<ol>
<li>Get Apple to provide 100 secure elements configured exactly like the targeted one, with the card management keys (required to load an app).</li>
<li>Get some hacker to develop a malicious application that gets the value of the code, or bypasses the code check, or gets the value of the encryption key, &#8230;</li>
<li>Establish an attack procedure and test it on actual phones.</li>
<li>Get Apple to provide the management key for the targeted phone.</li>
<li>Run the attack on the targeted phone, and bingo!</li>
</ol>
<p>This is slightly different. Apple still needs to collaborate, but not at the same level. Step 4, in particular, is about providing a key that can only be used on the terrorist&#8217;s phone. Step 1 is a bit more difficult, since Apple needs to support hacking efforts on their phones.</p>
<p>There is also a need to get a hacker. This may not be as difficult as it sounds, because as far as I know, the population of hackers capable of doing such a thing is small but includes:</p>
<ul>
<li>security evaluators working at labs who necessarily have ties to NIST (very close to NSA, here), or to the equivalent in another country;</li>
<li>people working in various companies and institutions who depend greatly on government contracts;</li>
<li>and a few real hackers, who could do some work for money, fame, or both.</li>
</ul>
<p>All these people, for various reasons, are far more vulnerable than Apple, and it is quite likely that FBI will be able to find one to cooperate with them.</p>
<p>And then, what&#8217;s left? Well, the security of some secure elements and Java Card implementations are really really good, and they will be protected against more attacks, performed by most attackers. Luckily, the handful of guys who may be able to break these implementations may not be willing to do so.</p>
<p>Still, it sounds like a good idea to support Apple here.</p>
<p><strong>Final thought</strong></p>
<p>This is now a problem that every security professional/company who is involved in the development, testing, or evaluation of consumer or industrial devices must think about: How will I react to injunctions from law enforcement? Should I make sure that I don&#8217;t know how to hack my device? </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2016/02/19/fiction-maybe-who-will-refuse-to-break-a-secure-element/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>About PIN, the iPhone is about 20 years behind smart cards</title>
		<link>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/</link>
		<comments>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/#comments</comments>
		<pubDate>Mon, 30 Mar 2015 13:07:41 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[PIN]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=17472</guid>
		<description><![CDATA[I was astonished when I read this article on breaking the iPhone PIN. Some guy has built a device that can guess your iPhone PIN, and he is using a very old trick that was performed on cards years ago. Of course, the exercise is pointless; as noted in the original article, Apple can (will) [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I was astonished when I read this article on <a href="https://www.schneier.com/blog/archives/2015/03/brute-forcing_i.html" class="liexternal">breaking the iPhone PIN</a>. Some guy has built a device that can guess your iPhone PIN, and he is using a very old trick that was performed on cards years ago. Of course, the exercise is pointless; as noted in <a href="https://nakedsecurity.sophos.com/2015/03/17/black-box-brouhaha-breaks-out-over-brute-forcing-of-iphone-pin-lock/" class="liexternal">the original article</a>, Apple can (will) update their phones very soon, making the device pointless.</p>
<p>The attack consists in detecting whether the PIN code is right or wrong (here, through some change in display intensity) before the number of false PIN presentations is incremented in persistent memory. Upon detection, the phone is immediately rebooted, and the increment doesn&#8217;t happen. Yeaahh!!</p>
<p>Similar attacks have been performed on smart cards for over 20 years. The attackers used to monitor the power consumption when verifying a PIN, and an increase in consumption (indicating a memory write) would indicate the beginning of an EEPROM update, and the right time to cut power.</p>
<p>The solution? Most people typically look for complex implementations, but the general solution is much simpler: just increment your counter of failed attempts before actually performing the comparison (and ensure that the actual memory update has been performed, not just cached). Then, no need to worry about power cuts and reboots, since the attacker will not get additional attempts.</p>
<p>I will tend to believe that most (all?) Java Card implementations of the <code>OwnerPIN</code> class include such countermeasures, providing adequate protection for a PIN comparison. And by the way, since recent iPhone&#8217;s include a Secure Element, this is where the PIN comparison belongs.</p>
<p>For more details on PIN attacks and countermeasures, you can read my tutorial <a href="http://javacard.vetilles.com/2008/05/15/jc101-12c-defending-against-attacks/" class="liinternal">JC101-12C: Defending against attacks</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Did Apple just boost mobile security?</title>
		<link>https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/</link>
		<comments>https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/#comments</comments>
		<pubDate>Fri, 12 Sep 2014 20:47:13 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[mobile payment]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=893</guid>
		<description><![CDATA[I have been working on mobile security for many years, and things haven&#8217;t moved much: justifying mobile security is always painful. Whyshould Ispend more money? There aren&#8217;t that many attacks! Some business use cases seemed like a good justification, but the economics are unclear and remain in the order of &#8220;if youget hacked, it could [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I have been working on mobile security for many years, and things haven&#8217;t moved much: justifying mobile security is always painful. Whyshould Ispend more money? There aren&#8217;t that many attacks! Some business use cases seemed like a good justification, but the economics are unclear and remain in the order of &#8220;if youget hacked, it could cost you a lot of money&#8221;.</p>
<p>With iPay, Apple just proved to many people that mobile security can have a favorable economics. By embedding a biometric sensor and putting their critical credentials on an embedded secure element, they have been able to negotiate a lower transaction fees on their payments and save millions in the future. Mobile security brings millions instead of just boring geek stuff? Now, that&#8217;s innovation.</p>
<p>Of course, the security of the iPhone 6 must live up to these high expectations. As much as the latest announcements bring a boost to mobile security, the announcement of a hack allowing a guy to steal a phone and use it &#8220;illegally&#8221; has the power to bring us back to the dark ages.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2014/09/12/did-apple-just-boost-mobile-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Convenience vs. Security vs. (Perceived) Security</title>
		<link>https://javacard.vetilles.com/2012/11/28/convenience-vs-security-vs-perceived-security/</link>
		<comments>https://javacard.vetilles.com/2012/11/28/convenience-vs-security-vs-perceived-security/#comments</comments>
		<pubDate>Wed, 28 Nov 2012 08:59:02 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[mobile payment]]></category>
		<category><![CDATA[Passbook]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=842</guid>
		<description><![CDATA[Yesterday, @poulpita tweeted a link to a blog explaining that convenience keeps winning against security. The main argument in this blog is about iOS6&#8217;s Passbook, which can store credit card numbers, for your convienience. The reasoning goes on with a comparison of the security merits of a credit card number stored on Passbook and a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Yesterday, <a href="https://twitter.com/poulpita" class="liexternal">@poulpita</a> tweeted a link to a blog explaining that <a href="http://www.infosecisland.com/blogview/22574-Convenience-vs-Security-Why-convenience-keeps-winning.html" class="liexternal">convenience keeps winning against security</a>. The main argument in this blog is about iOS6&#8217;s Passbook, which can store credit card numbers, <em>for your convienience</em>.</p>
<p>The reasoning goes on with a comparison of the security merits of a credit card number stored on Passbook and a real card. Read the paper for the details, but an obvious comparison is that a real card is easier to lose/steal (because we stick to our phone more than we stick to our wallet), and also easily accessible (the phone will be at least somehow encrypted, requiring some technical skillls to access the card numbers). In addition, credit cards are easily replaceable, and they usually entail a zero liability insurance for the end-user.</p>
<p>What surprised me is the conclusion: &#8220;convenience wins in the consumer mind&#8221;, and more specifically, &#8220;convenience may win out over a little risk&#8221;. From the risk analysis, my feeling is that using Passbook is actually less risky than carrying real cards, and even if one doesn&#8217;t agree with that, zero-liability means that, for the customer, the risk is the same: zero.</p>
<p>Although we agreee that security is a way to reduce risk globally, there are many different ways to reduce risk for every actor. For the end-user, in that specific case, the key aspect is the zero-liaility insurance offered by the credit card company. If there is a major security flaw in Passbook, there may be a problem between Apple and credit card companies, but end users should remain largely unaffected. The worst thing that could happen to them is to lose the convenience of Passbook if credit card companies deny to Apple the right to store card numbers in it.</p>
<p>Just another friendly reminder that our job as security providers is not just to randomly increase security of things, but to actually reduce the level of risk for an actor, which should be our customer. Banking smart cards are sold to banks, not to end users, and there is not reason to change this relationshp when the cards are dematerialized into software: our customers are the banks, and we need to reduce their risk (which, hopefully, can help them offer a zero-liability insurance to their customers at a better cost).</p>
<p>Disclosure: I just finished reading Brice Schneier&#8217;s <a href="http://www.amazon.fr/gp/product/1118143302/ref=as_li_ss_tl?ie=UTF8&#038;tag=lesvetilles-21&#038;linkCode=as2&#038;camp=1642&#038;creative=19458&#038;creativeASIN=1118143302" class="liexternal">Liars and Outliers: Enabling the Trust That Society Needs to Thrive</a><img src="http://www.assoc-amazon.fr/e/ir?t=lesvetilles-21&#038;l=as2&#038;o=8&#038;a=1118143302" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" />, which may explain why I have this unusual high-level view of security. Good book, by the way.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/11/28/convenience-vs-security-vs-perceived-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Some people don&#8217;t like phone security</title>
		<link>https://javacard.vetilles.com/2012/03/19/some-people-dont-like-phone-security/</link>
		<comments>https://javacard.vetilles.com/2012/03/19/some-people-dont-like-phone-security/#comments</comments>
		<pubDate>Mon, 19 Mar 2012 19:35:50 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=809</guid>
		<description><![CDATA[It seems that FBI isn&#8217;t able to perform smudge attacks very well. Apparently, they have been defeated by Android&#8217;s &#8220;pattern lock&#8221; on a Samsung phone. Well, my friends must be smarter than the FBI, because both of the guys who tried to defeat my pattern lock using a smudge attack succeeded. The fun part is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>It seems that FBI isn&#8217;t able to perform <a href="http://javacard.vetilles.com/2010/10/18/smudge-attacks-on-android/" class="liinternal">smudge attacks</a> very well. Apparently, <a href="http://www.wired.com/threatlevel/2012/03/fbi-android-phone-lock/" class="liexternal">they have been defeated</a> by Android&#8217;s &#8220;pattern lock&#8221; on a Samsung phone. Well, my friends must be smarter than the FBI, because both of the guys who tried to defeat my pattern lock using a smudge attack succeeded.</p>
<p>The fun part is of course that the FBI is now going after Google to find a solution to this problem, asking them plenty of information about the device and about the use that the bad guy did of it. Most of the things that they are requesting may indeed be in Google&#8217;s hands, if the bad guy is not very smart: e-mails, text messages, Web history, contacts, <em>etc</em>. Unless of course, the bad guy has been using non-default apps.</p>
<p>But it gets even more interesting when we get to the part asking for <em>â€œVerbal and/or written instructions for overriding the â€˜pattern lockâ€™ installed on theâ€ phone</em>. Since this is a Samsung phone, does Google have this information? What if there is no way to override this? I am not sure that the people who design security protocols for Trusted Execution Environments and/or for Secure Elements actually include a backdoor everywhere. After all, in some cases, not having a backdoor makes security easier to enforce. Of course, in this particular case, the pattern lock can be overridden by the owner&#8217;s Google account, so I guess that Google has the information.</p>
<p>But, in a more general term, it brings us back to the question of the &#8220;right&#8221; security level. If there is an open market for TEE/SE applications, the &#8220;superlock&#8221; application definitely sounds like a good one. It will certainly benefit our privacy, and it will just as certainly annoy anybody who wants to violate someone&#8217;s privacy, with the same debates as usual regarding the limits of the law. I am not completely sure where I stand on this, since I don&#8217;t like the idea of letting police look at <em>my</em> information, but I don&#8217;t really like the idea that my wonderful security products are used by bad guys to protect their content from police Of course, we can trust most bad guys to be like regular guys and make blatant security mistakes, but sometimes, it just won&#8217;t work. Oh well, we&#8217;ll see, and it should be interesting.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/03/19/some-people-dont-like-phone-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting your contactless card</title>
		<link>https://javacard.vetilles.com/2012/02/20/protecting-your-contactless-card/</link>
		<comments>https://javacard.vetilles.com/2012/02/20/protecting-your-contactless-card/#comments</comments>
		<pubDate>Mon, 20 Feb 2012 08:35:11 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[contactless]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=806</guid>
		<description><![CDATA[As I mentioned in NFC Payments 101, current contactless cards aren&#8217;t protected against the simple attack that consists in performing a transaction while your card is in your pocket. Since some models don&#8217;t require anything else than tapping the card, the attack is workable. Well, that may change. researchers for the University of Pittsburgh&#8217;s RFID [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>As I mentioned in <a href="http://javacard.vetilles.com/2012/02/16/nfc-payments-101/" class="liinternal">NFC Payments 101</a>, current contactless cards aren&#8217;t protected against the simple attack that consists in performing a transaction while your card is in your pocket. Since some models don&#8217;t require anything else than tapping the card, the attack is workable.</p>
<p>Well, that may change. researchers for the University of Pittsburgh&#8217;s <a href="http://www.engr2.pitt.edu/SITE/RFID/" class="liexternal">RFID Center for Excellence</a> have invented a on/off switch for cards, that simply requires you to put your finger on a specific spot on a contactless card to allow it to work (see a picture <a href="http://venturebeat.com/2012/02/18/researchers-create-onoff-switch-for-credit-cards-to-prevent-rfid-theft/" class="liexternal">here</a>).</p>
<p>Comment on the various articles around the topic are quite typical, ranging from the &#8220;This is very dumb because it is unpractical&#8221; to the &#8220;You have to give up some practicality for security&#8221;, and all variants in the middle. I would have liked to see the inventors&#8217; arguments, but I haven&#8217;t found a reference to a paper/report.</p>
<p>From previous experience, user experience often wins, in particular when, like with contactless cards, practicality is a selling point of a technology.Also, since the idea is to protect your cards in your wallet, I would think that it is easier for security-conscious to use wallets that include some kind of wire mesh or other wave-blocking technology. Since the on/off switch requires you to actually get the card out of your wallet, it is more or less equivalent, and it only annoys security-conscious people. The other guys will still be able totap their wallet (until, of course, they start having several contactless cards in there, in which case this optimization may not work any more).</p>
<p>This invention does not look flexible enough. The threat of someone performing transactions without you knowing is not significant enough to justify this kind of generalized measure for payment cards. On the other hand, it sounds much better as privacy-protecting technology on ID cards, since an ID card. Ensuring that the data about your identity will not leak from your wallet is interesting, and since an ID card is typically pulled out of the wallet before to be used, the technology is not an annoyance any more. But of course, in research like in politics, the fears associated to credit card theft remain more powerful than those associated to privacy protection (although identity theft is gaining traction).</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/02/20/protecting-your-contactless-card/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google Wallet has a Vulnerability (not on SE)</title>
		<link>https://javacard.vetilles.com/2012/02/14/google-wallet-has-a-vulnerability-not-on-se/</link>
		<comments>https://javacard.vetilles.com/2012/02/14/google-wallet-has-a-vulnerability-not-on-se/#comments</comments>
		<pubDate>Tue, 14 Feb 2012 21:31:11 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=791</guid>
		<description><![CDATA[The game has started for Google Wallet. Some guys are looking for vulnerabilities, and of course, finding some. You can read the papers to get all the details on this attack. Basically, they have been smart enough to use a salt before hashing the PIN value to avoid brute-force attacks. However, they haven&#8217;t been smart [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The game has started for Google Wallet. Some guys are <a href="http://viaforensics.com/mobile-security/forensics-security-analysis-google-wallet.html" class="liexternal">looking for vulnerabilities</a>, and of course, <a href="https://zvelo.com/blog/entry/google-wallet-security-pin-exposure-vulnerability" class="liexternal">finding some</a>.</p>
<p>You can read the papers to get all the details on this attack. Basically, they have been smart enough to use a salt before hashing the PIN value to avoid brute-force attacks. However, they haven&#8217;t been smart enough when they decided to store the salt just next to the hashed PIN value. Of course, with these two pieces of information, it takes at most 10,000 attempts to find the PIN (just check the video of the attack if you doubt that this is a very small number).</p>
<p>But hey, it&#8217;s just an attack/vulnerability. Maybe the first one, most likely not the last one. What surprises me most is that all these wallet programs insist on Common Criteria certifications of the Secure Elements, very complex certification programs for SE applications, and yet they leave behind this kind of basic vulberability in the mobile application, whose security does not seem to be formally evaluated by anyone. At least, the SIM/eSE security specialists should be able to sleep well for a while: they are unlikely to be the best target for real attackers, with such low-hanging fruit.</p>
<p>What really puzzled me from the zvelo guys is their analysis of what needs to be done. Their first step is correct: this PIN (which is used to open the wallet, not to validate a transaction) should be stored and verified in the Secure Element. Now, what surprises me more is their next statement:</p>
<blockquote><p>
Basically, by moving the PIN verification into the SE itself, this might constitute a â€œchange of agencyâ€ responsible for keeping the PIN secure. The fear is that Google might no longer be responsible for the security of the PIN, but rather the banks themselves. If this is in fact the case, then the banks may need to follow their own policies and regulations regarding ATM PIN security which obviously, and rightly, receive a great deal of scrutiny.
</p></blockquote>
<p>Now, this doesn&#8217;t look good. First, about the ownership of the SE. I am not sure what the deal between Google and the phone vendors is, but I would say that the SE is owned either by Google or by the phone vendor. After all, they are the ones who control the SE&#8217;s master keys.</p>
<p>Even if we don&#8217;t consider that, Google would not store the PIN in somebody else&#8217;s application. I am sure that they have their own app in the SE, that they would use this app to manage their little PIN. This is very easy to do with Java Card, and I am sure that they can develop this addendum easily.</p>
<p>Finally, as mentioned above, this PIN is not an ATM PIN, because it is not linked to a specific transaction. When you enter the PIN, it opens the wallet, but it does not authorize a transaction. It is the digital equivalent to putting a four-digit combination lock on your wallet (which is exactly what Google is claiming).</p>
<p>Nevertheless, the story remains interesting, and it reminds us of the complex ecosystem behind NFC payments. For instance, did the banks consider the Google PIN in their risk analysis of the Google wallet? Well, if they did, the Google PIN is now a bit weaker. It is not broken, though: a combination of malware and physical access to the phone is still required to make a fraudulent transaction.</p>
<p>To conclude on a positive note, the end of <a href="https://zvelo.com/blog/entry/google-wallet-security-pin-exposure-vulnerability" class="liexternal">the zvelo article</a> is a good list of recommendations. If you keep your phone clean and locked, the bad guys will have to find a better vulnerability.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/02/14/google-wallet-has-a-vulnerability-not-on-se/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>No memory, no chocolate!</title>
		<link>https://javacard.vetilles.com/2012/01/19/no-memory-no-chocolate/</link>
		<comments>https://javacard.vetilles.com/2012/01/19/no-memory-no-chocolate/#comments</comments>
		<pubDate>Thu, 19 Jan 2012 16:56:11 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Open issues]]></category>
		<category><![CDATA[eSE]]></category>
		<category><![CDATA[TEE]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=786</guid>
		<description><![CDATA[There has been some excitement lately about the fact that more and more phones are now getting embedded SE&#8217;s (eSE&#8217;s), associated to a NFC interface. Some of this excitement came from the ability to manage third-party applications on this embedded SE, as enabled by a whole range of GlobalPlatform specifications, and by the emergence of [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>There has been some excitement lately about the fact that more and more phones are now getting embedded SE&#8217;s (eSE&#8217;s), associated to a NFC interface. Some of this excitement came from the ability to manage third-party applications on this embedded SE, as enabled by a whole range of GlobalPlatform specifications, and by the emergence of TSM (Trusted Service Manager) offers.</p>
<p>Just imagine a world where a company can deploy its preferred network security application on all devices, while benefitting from SE-based security, or where innovative ccompanies ccan design security applications that rely on SE applications. Sounds good? Well, too good, because this is just not our world, at least not today.</p>
<p>There is an obvious reason for this: the &#8220;owners&#8221; of these eSE&#8217;s, whether they are phone vendors (Nokia, Samsung, &#8230;), wallet vendors (Google, Isis, &#8230;), or others, are not opening their devices. It is therefore very difficult to load applications on them. The most open environment that I know is in France, with <a href="http://www.afscm.org/en/" class="liexternal">AFSCM</a>, but as far as I know, this is an operator-dominated, SIM-based world, which has a long history of managing resource-constrained SIM cards.</p>
<p>So, why is it different with the relatively new players who own/manage embedded Secure Elements? My gut feeling is that memory limitations are part of the problem, if not the entire problem. If you think of an iPhone, memory is almost infinite: if you are missing memory, simply remove one or two songs out of the 2000 that your phone contains, and it fits. On an eSE, things are different: think of a 64k SE. If it already contains 4 applications, each using 15k of memory, there is no way to add a fifth one. The numbers are here very different, and the choices are much more limited. I don&#8217;t think that many iPhone users ever get to the point where they need to eliminate content that they really need to fit another content that they also really need. On a card, no such luck. And for a platform manager, this is very difficult to deal with, so their priority will be to get their applications on this, or at least the applications that can bring them immeddiate and/or obvious returns.</p>
<p>The problem is very different with a Trusted Execution Environment (TEE). Applications are here stored in the phone&#8217;s main memory, so there is no shortage of memory. This means that, for TEEs, it should not be too hard to actually use app stores or similar infrastructures. For eSE&#8217;s, we will need to work a bit more in order to achieve the same result.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/01/19/no-memory-no-chocolate/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
