On 25/07/2011 16:45, Werner Koch wrote: >> adversary, and the key isn't encrypted on the smart card. Then they can >> just "read" it off, if they get hold of it. In that circumstance, you > > That might be true with the v1 card which used a pretty old chip. The > v2 card uses a modern chip and card OS and thus the effort to read off > the key wouldn't be worth what you will gain from it.
That is reassuring. Although, I'd be happier if I could find a technical description of the feasibility of such an attack. But if one doesn't exist, it doesn't exist. -- Mike Cardwell https://grepular.com/ https://twitter.com/mickeyc Professional http://cardwellit.com/ http://linkedin.com/in/mikecardwell PGP.mit.edu 0018461F/35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users