diff -r aea1d40cf1ba -r 9ad6445a0354 handouts/ho01.tex --- a/handouts/ho01.tex Fri Jan 15 02:33:25 2016 +0000 +++ b/handouts/ho01.tex Tue Jan 19 14:37:33 2016 +0000 @@ -193,6 +193,21 @@ signature-based method. The customer could now lose significant amounts of money. +If you want to watch an entertaining talk about attacking +Chip-and-PIN cards, then this talk from the 2014 Chaos +Computer Club conference is for you: + +\begin{center} +\url{https://www.youtube.com/watch?v=XeZbVZQsKO8} +\end{center} + +\noindent They claim that they can actually clone with +Chip-and-PINs cards such that they get all data that was +on the Magstripe, except for three digits (the CVV number). +Remember Chip-and-PINs cards were introduced exactly for +preventing this. + + \subsection*{Of Cookies and Salts} Let us look at another example which will help with understanding how