kendor said:
Softus said:
Indeed. But why make any assumption? And if you have to make one, why make that particular one?
because the assumption was made in the form of a question and i was hoping someone with more technical knowledge of the system might be able to clarify how it works.
I'm now interested to find out how the system works on a more technical level as this may point out how secure the system really is ( or perhaps not as it may let those more devious get an understanding?
)
Okaaay, so you assumed that a particular piece of memory technology was used, in order to attract the attention of someone who knows more about the technology? Do you feel that your ruse worked?
While you're pondering on that one, it's not very likely that the knowledge you seek is going to posted here for all to see. We're talking about software knowledge from the financial IT industry that would be potentially useful to criminals in cracking stolen cards and PINs.
Specifics aside, it's obvious how it works. Given that the PIN is stored on the card, in encrypted form, verification of the PIN involves using something similar to what is now run-of-the-mill software PKI technology to authenticate what equates to a 4-character digital signature. The retailers' EPOS machines, the banks' servers, and the connections between them, all represent a trust heirarchy.
Maybe you're worried about precisely what encryption method is used? Maybe you want to know whether the PIN is decrypted at the EPOS terminal or at the bank? Or how strong the PIN encryption is, and how easily/quickly someone could crack a stolen card? This information isn't generally distributed, and if you became someone who has that knowledge that you would also become someone who is automatically a suspect when a fraud occurs.
The bottom line is, as long as you act responsibly in protecting your card and your PIN, you're not liable for any loss.