On 16/08/12 10:29, gn...@lists.grepular.com wrote:
> It can attempt to initiate decryption/signing, but it still requires the
> user to enter their pin, so some sort of social engineering is also
> required. It could wait for you to try to decrypt/sign something, and then
> send some alternative data to sign/decrypt to the reader instead, but at
> least the user would see that something went wrong, and that would only
> work for one sign/decrypt operation.

This is correct for signing, when using the "signature force PIN" flag.
Unfortunately, there is no equivalent flag for encryption (or authentication),
so once a user has entered the PIN, the malware can just request additional
decryptions and authentications. The user probably won't notice. A LED on the
reader might flash when accessing the card, but if you do those additional
encryptions and authentications directly after a user-initiated action, they
probably won't notice that it flashes for a little longer than normal.

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://wwwhome.cs.utwente.nl/~lebbing/pubkey.txt

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to