On Wednesday, April 10, 2002, at 08:23  AM, Michael Motyka wrote:

> Or more.
>
> Not to mention that if you didn't want your money chirping its presence
> every time a bad actor pinged it you could just disable the transponder
> in the money :
>
> mechanical pressure or repeated bending
> high voltage
> high power RF
> heat
>
> For paper money failure rates will probably be high anyway.
>

As I said in another article, I think there'll be zero acceptance rate 
for any _general_ smartcard cash system which:

-- has no user-controlled on/off switch, or user authentication (PIN 
entry at minimum)
-- has a wide broadcast pattern
-- generally, has a "promiscuous" disclosure model

By "general" I mean a store of value to be used roughly as cash and 
credit cards are used today.

Specialized uses such as subway or bridge token systems may have 
different models. But they will likely also be:

-- limited in amount of money
-- linked to security protocols, e.g., only BART turnstile nominally has 
access
-- broadcast range and transponder physics tuned to specific use (e.g., 
BART turnstyle)

Now, of course, there may be calls by government for "back doors," for 
forced promiscuity, but this will complicate the engineering immensely. 
And shielding is still trivial.

I just don't see this as an interesting or fruitful discussion...maybe 
it's going to be the new version of the "Can I use thermite to destroy 
my data?" recurring thread.

--Tim May
"To those who scare peace-loving people with phantoms of lost liberty, 
my message is this: Your tactics only aid terrorists."  --John Ashcroft, 
U.S. Attorney General

Reply via email to