<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments for On the road to Bandol</title>
	<atom:link href="https://javacard.vetilles.com/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Thu, 18 May 2017 07:26:32 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Comment on Des contraintes naÃ®t la beautÃ© by Prolog est orphelin &#124; binaire</title>
		<link>https://javacard.vetilles.com/2017/05/16/des-contraintes-nait-la-beaute/#comment-31939</link>
		<dc:creator><![CDATA[Prolog est orphelin &#124; binaire]]></dc:creator>
		<pubDate>Thu, 18 May 2017 07:26:32 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26354#comment-31939</guid>
		<description><![CDATA[[&#8230;] aussi le billetÂ d&#8217;Ã‰ric VÃ©tillard sur son blogÂ : Â« Des contraintes naÃ®t la [&#8230;]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] aussi le billetÂ d&rsquo;Ã‰ric VÃ©tillard sur son blogÂ : Â« Des contraintes naÃ®t la [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Beyond Java Card by Eric VÃ©tillard</title>
		<link>https://javacard.vetilles.com/2016/05/19/beyond-java-card/#comment-30556</link>
		<dc:creator><![CDATA[Eric VÃ©tillard]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 16:48:23 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25880#comment-30556</guid>
		<description><![CDATA[I haven&#039;t done this in a long time...

Try to look at https://community.oracle.com/community/java/java_embedded/java_card_2 for support.

Good luck!]]></description>
		<content:encoded><![CDATA[<p>I haven&#8217;t done this in a long time&#8230;</p>
<p>Try to look at <a href="https://community.oracle.com/community/java/java_embedded/java_card_2" rel="nofollow" class="liexternal">https://community.oracle.com/community/java/java_embedded/java_card_2</a> for support.</p>
<p>Good luck!</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Beyond Java Card by leonidas</title>
		<link>https://javacard.vetilles.com/2016/05/19/beyond-java-card/#comment-30555</link>
		<dc:creator><![CDATA[leonidas]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 12:54:00 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25880#comment-30555</guid>
		<description><![CDATA[i am trying to test a Java Card applet to establish a connection to a simulator such as cref:

try {
    sckClient = new Socket(&quot;localhost&quot;, 9025);
    InputStream is = sckClient.getInputStream();
    OutputStream os = sckClient.getOutputStream();
    cad = CadDevice.getCadClientInstance(CadDevice.PROTOCOL_T0, is, os);
} catch (Exception e) {
    System.out.println(&quot;error&quot;);
    return;
}

try {
    cad.powerUp();
......

My code get stuck in powerUp without any error or exception. I am using the sample_device and sample_platform that comes with Java Card Development Kit 3.0.5u1]]></description>
		<content:encoded><![CDATA[<p>i am trying to test a Java Card applet to establish a connection to a simulator such as cref:</p>
<p>try {<br />
    sckClient = new Socket(&#8220;localhost&#8221;, 9025);<br />
    InputStream is = sckClient.getInputStream();<br />
    OutputStream os = sckClient.getOutputStream();<br />
    cad = CadDevice.getCadClientInstance(CadDevice.PROTOCOL_T0, is, os);<br />
} catch (Exception e) {<br />
    System.out.println(&#8220;error&#8221;);<br />
    return;<br />
}</p>
<p>try {<br />
    cad.powerUp();<br />
&#8230;&#8230;</p>
<p>My code get stuck in powerUp without any error or exception. I am using the sample_device and sample_platform that comes with Java Card Development Kit 3.0.5u1</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on IoT Security as Externality: Cluelessness, Denial, and more by Eric VÃ©tillard</title>
		<link>https://javacard.vetilles.com/2016/11/21/iot-security-as-externality-cluelessness-denial-and-more/#comment-28764</link>
		<dc:creator><![CDATA[Eric VÃ©tillard]]></dc:creator>
		<pubDate>Mon, 28 Nov 2016 10:03:47 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26296#comment-28764</guid>
		<description><![CDATA[I agree with you on the importance of economics in that area, but like Schneier and others, I am afraid that the market will not spontaneously regulate itself.

There is a very strong incentive in IT markets to get a product out before the others to grab a dominant position as fast as possible, and no incentive to slow down and design a secure offer.

So, including security in a connected product today is a strategic mistake and a waste of money. Time to market is so much more important. 

Customers don&#039;t really care either, and I don&#039;t see cloud vendors or MNOs saying things like &quot;you&#039;re out of my cloud/network if you system isn&#039;t secure&quot;.

So, I am not a fan of regulation, but there is no credible alternative today, and the time is counted. When some hackers takes down a big chunk of internet or kills a few persons, then regulation will step in hard in panic mode, and that doesn&#039;t sound good.]]></description>
		<content:encoded><![CDATA[<p>I agree with you on the importance of economics in that area, but like Schneier and others, I am afraid that the market will not spontaneously regulate itself.</p>
<p>There is a very strong incentive in IT markets to get a product out before the others to grab a dominant position as fast as possible, and no incentive to slow down and design a secure offer.</p>
<p>So, including security in a connected product today is a strategic mistake and a waste of money. Time to market is so much more important. </p>
<p>Customers don&#8217;t really care either, and I don&#8217;t see cloud vendors or MNOs saying things like &#8220;you&#8217;re out of my cloud/network if you system isn&#8217;t secure&#8221;.</p>
<p>So, I am not a fan of regulation, but there is no credible alternative today, and the time is counted. When some hackers takes down a big chunk of internet or kills a few persons, then regulation will step in hard in panic mode, and that doesn&#8217;t sound good.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on IoT Security as Externality: Cluelessness, Denial, and more by Tiana R.</title>
		<link>https://javacard.vetilles.com/2016/11/21/iot-security-as-externality-cluelessness-denial-and-more/#comment-28578</link>
		<dc:creator><![CDATA[Tiana R.]]></dc:creator>
		<pubDate>Sat, 26 Nov 2016 00:14:29 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26296#comment-28578</guid>
		<description><![CDATA[I was about to write tons of things but actually, the following three lines, from schneir&#039;s blog, that you referenced at the very beginning of your article, summarizes my thoughts:

&quot;Information security is not a technological problem. It is an economics problem. And the way to improve information security is to fix the economics problem.&quot;

Some people spend time to create needs and wants, and competitiveness creates a kind of race that is getting uncontrollable, and more particularly with &quot;gadgets&quot;. 

As the final end user has so many choices, almost anyone can come and propose a service that probably already exist, yet, it does not matter because people like to have &quot;the choice&quot;.

In my opinion, the best solution (but not my favorite one) would be a natural self-regulation of the market, namely, few big actors/companies must take the lead and stop this frenetic race to &quot;the-most-connected-device&quot;.

The only analogy I have in mind right now is the law of jungle where natural predatorS (I insist with the &quot;S&quot;) must control some different territories.

I don&#039;t think that government and laws can be a solution as some people suggest, unless those laws are applied to the whole world instead of only few small countries.]]></description>
		<content:encoded><![CDATA[<p>I was about to write tons of things but actually, the following three lines, from schneir&#8217;s blog, that you referenced at the very beginning of your article, summarizes my thoughts:</p>
<p>&#8220;Information security is not a technological problem. It is an economics problem. And the way to improve information security is to fix the economics problem.&#8221;</p>
<p>Some people spend time to create needs and wants, and competitiveness creates a kind of race that is getting uncontrollable, and more particularly with &#8220;gadgets&#8221;. </p>
<p>As the final end user has so many choices, almost anyone can come and propose a service that probably already exist, yet, it does not matter because people like to have &#8220;the choice&#8221;.</p>
<p>In my opinion, the best solution (but not my favorite one) would be a natural self-regulation of the market, namely, few big actors/companies must take the lead and stop this frenetic race to &#8220;the-most-connected-device&#8221;.</p>
<p>The only analogy I have in mind right now is the law of jungle where natural predatorS (I insist with the &#8220;S&#8221;) must control some different territories.</p>
<p>I don&#8217;t think that government and laws can be a solution as some people suggest, unless those laws are applied to the whole world instead of only few small countries.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Java Card, a farewell by Eric VÃ©tillard</title>
		<link>https://javacard.vetilles.com/2016/05/09/java-card-a-farewell/#comment-20505</link>
		<dc:creator><![CDATA[Eric VÃ©tillard]]></dc:creator>
		<pubDate>Wed, 11 May 2016 05:28:52 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25865#comment-20505</guid>
		<description><![CDATA[It all depends about what we mean by &quot;reaching full potential&quot;. A few billions of devices every year clearly represents a significant part of the potential. And the other question that I would ask is as follows: Would &quot;true agility, multi-app and post-personalization delivery&quot; really improve the deployment and use of smart cards?]]></description>
		<content:encoded><![CDATA[<p>It all depends about what we mean by &#8220;reaching full potential&#8221;. A few billions of devices every year clearly represents a significant part of the potential. And the other question that I would ask is as follows: Would &#8220;true agility, multi-app and post-personalization delivery&#8221; really improve the deployment and use of smart cards?</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Java Card, a farewell by MartinP</title>
		<link>https://javacard.vetilles.com/2016/05/09/java-card-a-farewell/#comment-20481</link>
		<dc:creator><![CDATA[MartinP]]></dc:creator>
		<pubDate>Mon, 09 May 2016 14:04:16 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25865#comment-20481</guid>
		<description><![CDATA[Thanks for the wrap up! 

To be honest, that&#039;s precisely what has troubled me as an &quot;insider&quot; most, for the past few years: how does one built true agility and multi-app, post-personalization delivery. The technology seems to be there, but business and politics don&#039;t seem to follow yet. Why this matters? Because indeed, (expecting) web-like evolution can make the smart cards (and universal secure elements) as we know it obsolete before the technology reaches full potential...]]></description>
		<content:encoded><![CDATA[<p>Thanks for the wrap up! </p>
<p>To be honest, that&#8217;s precisely what has troubled me as an &#8220;insider&#8221; most, for the past few years: how does one built true agility and multi-app, post-personalization delivery. The technology seems to be there, but business and politics don&#8217;t seem to follow yet. Why this matters? Because indeed, (expecting) web-like evolution can make the smart cards (and universal secure elements) as we know it obsolete before the technology reaches full potential&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Fiction (maybe): Who will refuse to break a secure element? by Fred</title>
		<link>https://javacard.vetilles.com/2016/02/19/fiction-maybe-who-will-refuse-to-break-a-secure-element/#comment-20307</link>
		<dc:creator><![CDATA[Fred]]></dc:creator>
		<pubDate>Fri, 22 Apr 2016 13:59:46 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25857#comment-20307</guid>
		<description><![CDATA[Eric wroite the scenario, we know the actors and here is the bill &quot;FBI Paid More Than $1 Million to Hack San Bernardino iPhone &quot;]]></description>
		<content:encoded><![CDATA[<p>Eric wroite the scenario, we know the actors and here is the bill &#8220;FBI Paid More Than $1 Million to Hack San Bernardino iPhone &#8220;</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on PINs still under attack! by Thoth</title>
		<link>https://javacard.vetilles.com/2011/08/27/pins-still-under-attack/#comment-20306</link>
		<dc:creator><![CDATA[Thoth]]></dc:creator>
		<pubDate>Fri, 22 Apr 2016 13:34:51 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=734#comment-20306</guid>
		<description><![CDATA[One obvious method to prevent smartphone screen password attacks by motion sensors in the phone is to randomise the keyboard which have long been implemented by Cyanogen.

In fact the more secure method is to include a PIN or biometric entry on the security device/smart card for on-device authenticatiin then press a OK or Cancel transaction on the securitu device/smart card.

The Zwipe product includes a fingerprint sensor on a smart card and the likes of Plastc and other E-ink cards are embedding touchscreen E-ink or buttons on smart cards.

Finally, the Ledger Blue hardware is a personal security device integrating a ST31 secure element tied to a touchscreen with USB, NFC and BLE connectivity for secure applications and PIN entry onto a single device to make scraping PIN much harder.]]></description>
		<content:encoded><![CDATA[<p>One obvious method to prevent smartphone screen password attacks by motion sensors in the phone is to randomise the keyboard which have long been implemented by Cyanogen.</p>
<p>In fact the more secure method is to include a PIN or biometric entry on the security device/smart card for on-device authenticatiin then press a OK or Cancel transaction on the securitu device/smart card.</p>
<p>The Zwipe product includes a fingerprint sensor on a smart card and the likes of Plastc and other E-ink cards are embedding touchscreen E-ink or buttons on smart cards.</p>
<p>Finally, the Ledger Blue hardware is a personal security device integrating a ST31 secure element tied to a touchscreen with USB, NFC and BLE connectivity for secure applications and PIN entry onto a single device to make scraping PIN much harder.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Fiction (maybe): Who will refuse to break a secure element? by Fred</title>
		<link>https://javacard.vetilles.com/2016/02/19/fiction-maybe-who-will-refuse-to-break-a-secure-element/#comment-20190</link>
		<dc:creator><![CDATA[Fred]]></dc:creator>
		<pubDate>Wed, 13 Apr 2016 15:06:53 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=25857#comment-20190</guid>
		<description><![CDATA[La suite : http://www.lepoint.fr/monde/san-bernardino-des-hackers-ont-aide-le-fbi-pour-debloquer-un-iphone-13-04-2016-2031910_24.php]]></description>
		<content:encoded><![CDATA[<p>La suite : <a href="http://www.lepoint.fr/monde/san-bernardino-des-hackers-ont-aide-le-fbi-pour-debloquer-un-iphone-13-04-2016-2031910_24.php" rel="nofollow" class="liexternal">http://www.lepoint.fr/monde/san-bernardino-des-hackers-ont-aide-le-fbi-pour-debloquer-un-iphone-13-04-2016-2031910_24.php</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
