home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!news.acns.nwu.edu!telecom-request
- Date: Sat, 2 Jan 93 13:22:35 -0500
- From: shri%unreal@cs.umass.edu
- Newsgroups: comp.dcom.telecom
- Subject: Re: Good Opportunity For Fraud
- Message-ID: <telecom13.3.2@eecs.nwu.edu>
- Organization: UMass, Amherst MA + Temporal Sys & Computer Networks Bombay India
- Sender: Telecom@eecs.nwu.edu
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 13, Issue 3, Message 2 of 12
- Lines: 18
-
- In article <telecom12.928.6@eecs.nwu.edu> cgordon@vpnet.chi.il.us wrote:
-
- > I've been working on a credit card / phone project, and discovered
- > something that is probably known to many but was news to me: My PIN is
- > _on_ my calling card! Recorded on Track 2, offset 23 characters after
- > the SS. In the clear.
-
- I believe the bankcard passwords are also often in the clear in the
- ISO mag stripe. Shudder! Remember having read something to that
- effect on the net. Could some please deny ... please .. please!
-
- Or do the ATMs check with the central computer each time (hope the
- traffic is encrypted.)
-
-
- shrikumar (shri@legato.cs.umass.edu)
-
-