<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; Google</title>
	<atom:link href="https://javacard.vetilles.com/tag/google/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Google&#8217;s vision of Secure Elements</title>
		<link>https://javacard.vetilles.com/2011/12/30/googles-vision-of-secure-elements/</link>
		<comments>https://javacard.vetilles.com/2011/12/30/googles-vision-of-secure-elements/#comments</comments>
		<pubDate>Fri, 30 Dec 2011 14:35:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[mobile payment]]></category>
		<category><![CDATA[Secure Element]]></category>
		<category><![CDATA[wallet]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=776</guid>
		<description><![CDATA[Google has launched its Google Wallet service, which uses a secure element in the phone to provide some security. Of course, Java card is in every one of these secure elements, but it is not the point today. I have just stumbled upon the Google Wallet page. Initially, I was looking for information about how [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Google has launched its Google Wallet service, which uses a secure element in the phone to provide some security. Of course, Java card is in every one of these secure elements, but it is not the point today. I have just stumbled upon the <a href="http://www.google.com/wallet/" class="liexternal">Google Wallet page</a>. Initially, I was looking for information about how to load the Google Wallet on my Nexus S during a visit to the U.S. I haven&#8217;t found this information (if you know, I am interested). However, I have found how Google talks about its wallet&#8217;s security.</p>
<p>Here is the sentence that first drew my attention:</p>
<blockquote><p>
<strong>A wallet you can lock</strong>. Stay safe with the Google Wallet PIN and with secure underlying technology.
</p></blockquote>
<p>This started again my love/hate relationship with Google. A wallet you can lock? It&#8217;s just brilliant, far better than anything else I have seen on the same topic. Where do they find these things? Now, let&#8217;s see how the rest fares, from their <a href="http://www.google.com/wallet/how-it-works-security.html" class="liexternal">Security</a> section.</p>
<blockquote><p>Google Wallet stores your encrypted payment card credentials on a computer chip on your phone called the Secure Element.
</p></blockquote>
<p>Sounds good. The Secure Element is explicitly defined as a separate chip. I find it interesting that they feel the need to mention that the credentials are encrypted.</p>
<blockquote><p>Think of the Secure Element as a separate computer, capable of running programs and storing data. The Secure Element is separate from your Android phone&#8217;s memory.
</p></blockquote>
<p>Once again, all of this sounds good. Very nice way to describe a smart card.</p>
<blockquote><p>The chip is designed to only allow trusted programs on the Secure Element itself to access the payment credentials stored therein.
</p></blockquote>
<p>Uh oh! I really recognize my favorite Java Card firewall, isolating applications from each other. But I am a bit disappointed to read that the &#8220;chip&#8221; is designed to support that. Yes, the chip&#8217;s memory can only be accessed from the chip itself; but on the chip, the isolation is software-based.</p>
<p>Next step, the FAQ&#8217;s <a href="http://www.google.com/wallet/faq.html#security-and-privacy" class="liexternal">Security and Privacy</a> section. Among basic questions about lost phones, there are two good questions related to secure elements:</p>
<ul>
<li>What is the Secure Element and how secure is it?</li>
<li>Could a malicious application access my credit card on the Secure Element?</li>
</ul>
<p>You can read the complete answers there. However, here is what should be the most important sentence, since it ends the answers to both questions:</p>
<blockquote><p>
There are multiple levels of protection for data stored on the Secure Element and it is protected at the hardware level from snooping or tampering.
</p></blockquote>
<p>Of course, smart card specialists know about all the terrible attacks hidden behind the &#8220;snooping and tampering&#8221;, and how to protect from them. But the sole mention of data is a bit disappointing.</p>
<p>The answers also mention several times that only the Google Wallet (and other authorized programs) can access the Secure Element, and that this access control is strictly enforced. This is good, and we all like the fact that access control is present.</p>
<p>Now, what&#8217;s missing? You may have guessed it from my &#8220;data only&#8221; disappointment. There is no mention of the fact that the secure element can do more than payment. So, Google, if you are reading this, I will go as far as writing the missing FAQ piece:</p>
<blockquote><p>
<strong>Can I use my Secure Element for protecting other assets?</strong></p>
<p>Your Secure Element is a small but powerful chip, which runs its own applications to manage sensitive data. It can even host several applications, to provide different security-related services. Of course, since the access to the Secure Element is strictly controlled, only authorized developers can write applications for it. We have selected a limited number of partners, who provide applications that rely on the Secure Element to manage their security credentials. These offers include VPN application, secure authentication applications, and much more.
</p></blockquote>
<p>Hoping that it will become useful someday. And if you need more material on Java Card, just let me know.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/12/30/googles-vision-of-secure-elements/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>GoogleIO suggestions for new NFC apps</title>
		<link>https://javacard.vetilles.com/2011/05/11/googleio-suggestions-for-new-nfc-apps/</link>
		<comments>https://javacard.vetilles.com/2011/05/11/googleio-suggestions-for-new-nfc-apps/#comments</comments>
		<pubDate>Wed, 11 May 2011 16:26:21 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[NFC]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=729</guid>
		<description><![CDATA[GoogleIO is happening right now in San Francisco. On the agenda, there has been (only?) one talk on NFC in the Android track. During this talk, the speakers gave an introduction to NFC technology, but for someone who knows the basics on NFC, the most interesting parts were the demos, showing interesting NFC applications. But [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>GoogleIO is happening right now in San Francisco. On the agenda, there has been (only?) one talk on NFC  in the Android track. During <a href="http://www.youtube.com/watch?v=49L7z3rxz4Q" class="liexternal">this talk</a>, the speakers gave an introduction to NFC technology, but for someone who knows the basics on NFC, the most interesting parts were the demos, showing interesting NFC applications.</p>
<p>But first, let&#8217;s see what they have to say about the characteristics of NFC. I kinda like their presentation of things:</p>
<ul>
<li><strong>Low friction. The main advantage that they have been advertising. The idea is here that when you scan a NFC tag, the appropriate application is instantly launched, which is a much better user experience than using QR-codes.<strong></li>
<li><strong>Low range.<strong> Some good, and some bad. On the good side, the low range is a security guarantee: in order to start a NFC exchange, an attacker will need to be uncomfortably close to his victim. On the bad side, if you want to do something, NFC will be used to bootstrap, but another wireless connection (Bluetooth, WiFi) will need to be set up.</li>
<li><strong>Low data rate. Not good, and another reason to switch to another wireless connection after bootstrap.<strong></li>
</ul>
<p>So, in Google IO, the main message is that NFC has &#8220;low friction&#8221; and allows developers to instantly start their application, based on a contextual information (a NDEF tag, or another phone in P2P mode). The examples for tags were basic but demonstrative, as they actually triggered an action (or at least, they tried to, because as usual in big conferences, network was a problem).</p>
<p>The P2P examples were even more demonstrative. The most basic one used NFC in a gaming environment: (1) take two phones on which the same 2-player application is installed, (2) start the application on one, (3) move the second phone in NFC range. Then, the magic occurs: the application is started on the second phone, and a Bluetooth connection is setup. The players can now start a new game and play. Now, that&#8217;s user experience.</p>
<p>This concept can then be extended, and this will actually happen in the next release (dubbed Ice Cream Sandwich, one of my favorite American junk foods). Then, some of the core applications will be NFC-enabled. For instance, to share a contact, simply open the contact, and have the recipient put his phone in range: the contact goes to the other phone. Same thing to exchange a URL, to confirm an appointment, or a few more things. Very impressive indeed, and for me, a whole new set of applications for NFC.</p>
<p>I kept one for the end. If we reconsider the gaming example, but the second player does not have the application installed, what will happen? He will be forwarded to Android Market, of course, to purchase the application. This just works.</p>
<p>Google even gets a reward for this: since both people exchanging data on a P2P NFC connection are likely to be connected to their Google account, such recommendations are really easy to track, or even to reward. More information for the Google database.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/05/11/googleio-suggestions-for-new-nfc-apps/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hadopi, Google, and a few illegal things</title>
		<link>https://javacard.vetilles.com/2010/03/12/hadopi-google-and-a-few-illegal-things/</link>
		<comments>https://javacard.vetilles.com/2010/03/12/hadopi-google-and-a-few-illegal-things/#comments</comments>
		<pubDate>Fri, 12 Mar 2010 21:43:28 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[Google]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=552</guid>
		<description><![CDATA[We European have strange laws. The French Hadopi law is a law that is intended to protect copyright owners against big bad teenage copiers. That law has been voted, and it is in the process of being enacted. Of course, it won&#8217;t work; such laws just don&#8217;t work. ReadWriteWeb has published an article about Hadopi [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>We European have strange laws. The French <a href="http://en.wikipedia.org/wiki/Hadopi" rel="nofollow" class="liwikipedia">Hadopi</a> law is a law that is intended to protect copyright owners against big bad teenage copiers. That law has been voted, and it is in the process of being enacted. Of course, it won&#8217;t work; such laws <a href="http://www.guardian.co.uk/technology/blog/2010/mar/12/demise-music-industry-facts" class="liexternal">just don&#8217;t work</a>.</p>
<p>ReadWriteWeb has published an article about Hadopi economics (<a href="http://fr.readwriteweb.com/2010/03/10/a-la-une/hadopi-pourrait-bien-causer-beaucoup-de-tort-aux-ayants-droits/" class="liexternal">in French</a>, sorry). I will try to provide a quick outline here, but it&#8217;s far better to read the full thing.</p>
<p>Before Hadopi, the music industry was losing money because many French youngsters exchanged &#8220;free&#8221; music through P2P, helped by The Pirate Bay and similar organizations, who made no real money out of this. Then came the law, directly targeting the use of P2P tools. Such exchanges are now monitored, and it looks quite dangerous to continue doing it (after all, if you get caught three times, you can lose your Internet connection).</p>
<p>Well, using P2P is dangerous, but using direct downloads from servers sitting outside of France remains safe (it seems to tbe the way the law is applied). So now, the effect of the law is to promote a new technology. So far, nothing big: the law is just not working, and it isn&#8217;t the first one. It gets better when you realize that the companies providing the new technology are actually making money from it. Pirates are paying for the ability to download content illegally.</p>
<p>Now, that makes a big difference. The law has created a viable business model, possibly an entire ecosystem. Most likely illegal in France, but hosted in countries in which such laws can&#8217;t be enforced, and ready to move in a few minutes when needed. And guess what? On the other side, the music industry still doesn&#8217;t have a viable business model for selling their music. Conclusion; the law is not only inefficient, it is counter-productive, because it builds a viable (although illegal) alternative to the legal music industry.</p>
<p>In Italy, they have privacy laws that prohibit the publication of images that make fun of people, especially if they can&#8217;t defend themselves; such a law defends human dignity. That&#8217;s a good law, and it got some Google executives <a href="http://www.nytimes.com/2010/02/28/weekinreview/28liptak.html" class="liexternal">comdemned to suspended prison terms</a> over the publication of an offending video on Youtube. Google calls this <a href="http://googleblog.blogspot.com/2010/02/serious-threat-to-web-in-italy.html" class="liexternal">a serious threat to the Web</a>, and gathered support from many. That&#8217;s because their role is very limited in this; after all, they only acted as a hosting platform. That&#8217;s true, but &#8230; they also made money from that video, because Google also is an ad broker who displays advertising on Youtube pages. And when I look at it from that perspective, I don&#8217;t just see a hosting platform operator.</p>
<p>I see a company that makes money by exploiting illegal material in a highly profitable ecosystem. The internet is great: with all its shades of grey, we have to love it.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/03/12/hadopi-google-and-a-few-illegal-things/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google ads in Java Card 3 ?</title>
		<link>https://javacard.vetilles.com/2009/03/30/google-ads-in-java-card-3/</link>
		<comments>https://javacard.vetilles.com/2009/03/30/google-ads-in-java-card-3/#comments</comments>
		<pubDate>Mon, 30 Mar 2009 21:14:03 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Java Card Bandol]]></category>
		<category><![CDATA[Site news]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Java Card 3.0]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=264</guid>
		<description><![CDATA[You may have noticed that I have added Google Ads to this blog. Well, it&#8217;s the crisis, and you never know, it may bring in a few extra bucks. Of course, I know that I don&#8217;t have millions of readers, so this is not the only motivation. I have been busy in the past week [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>You may have noticed that I have added Google Ads to this blog. Well, it&#8217;s the crisis, and you never know, it may bring in a few extra bucks. Of course, I know that I don&#8217;t have millions of readers, so this is not the only motivation.</p>
<p>I have been busy in the past week preparing a tutorial and training on Java Card, and this has included learning about JavaScript (yuk!), and a little bit about mashups. And of course, when you talk about mashups, Google Adsense is an interesting idea. So, I decided to sign in to Adsense, to see how it worked.</p>
<p>Well, it is definitely simple to use, and it only took me a few minutes to start, and less than two hours to tune. So now, this blog includes some ads. I also have included a Google-based search on the site, which happens to be work better than the default search, which reminds us of how Google started. If you have strong feelings about it (good or bad), just let me know by sending a comment.</p>
<p>The next question is: could I include such ads in a Java Card 3.0 ad?<br />
<span id="more-264"></span></p>
<p>Well, maybe, but at least, it won&#8217;t be easy. Here are a few of the reasons:</p>
<ul>
<li>Adsense wants to analyze your content, and it may not be that easy to analyze the content of a Java Card 3.0 application.</li>
<li>When using Sun&#8217;s RI, the default URI is <code>http://localhost:8019</code>, and cards are quite likely to have a very local address. Not that easy for Google.</li>
</ul>
<p>Obviously, Adsense has not been designed to work with Java Card 3.0, as Java Card 3.0 cards are a new kind of personal Web servers, with very personal Web applications. So personal that they are actually difficult to analyze with the traditional means. However, there is a potential market here, as these personal Web servers are quite likely to be able to serve very well targeted ads (remember, they are supposed to be used for really personal information).</p>
<p>Maybe the next step for Google.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/03/30/google-ads-in-java-card-3/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>What happened since 2001?</title>
		<link>https://javacard.vetilles.com/2008/10/04/what-happened-since-2001/</link>
		<comments>https://javacard.vetilles.com/2008/10/04/what-happened-since-2001/#comments</comments>
		<pubDate>Sat, 04 Oct 2008 11:15:21 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Google]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2008/10/04/what-happened-since-2001/</guid>
		<description><![CDATA[To celebrate its birthday, Google is giving us he opportunity to search the Web as it was in 2001. So, let&#8217;s try to catch a few differences. The Web has grown. In 2001, when searching for my last name, 9 out of 10 entries in the first page were about me. Today, it is only [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>To celebrate its birthday, Google is giving us he opportunity to search the Web <a href="http://www.google.com/search2001/" class="liexternal">as it was in 2001</a>. So, let&#8217;s try to catch a few differences.</p>
<ul>
<li>The Web has grown. In 2001, when searching for my last name, 9 out of 10 entries in the first page were about me. Today, it is only 1 out of 10 (and it related to my thesis work from 15 years ago).</li>
<li>Many companies were not around, including Gemalto. Even Axalto was not born yet. Trusted Labs was not around either.</li>
<li>Java Card searches have not changed much. Some references like JavaWorld&#8217;s articles are getting old, but the search results definitely look familiar</li>
<li>Smart card web servers already existed in 2001! Jim Rees, from CITI, implemented a &#8220;WebCard&#8221; on a Cyberflex.</li>
<li>&#8220;Java Card 3.0&#8243; was already in the news. Some early believers in two French universities (LIP6 and Avignon) offered master thesis topics on Java Card 3.0. Definitely visionaries.</li>
</ul>
<p>Well, I could go on forever, but this is enough fun for today.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2008/10/04/what-happened-since-2001/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
