Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 12 submissions in the queue.
posted by chromas on Wednesday April 11 2018, @03:01PM   Printer-friendly
from the a-bluetooth-dong'l-do-ya dept.

Fuze card is wide open to data theft over Bluetooth. A fix is on the way.

The makers of the programmable Fuze smart card say it's powerful enough to be your wallet in one card yet secure enough to be used the same way as traditional payment cards—including trusting it to restaurant servers when paying the bill. But it turns out that convenience comes with a major catch. A flaw makes it possible for anyone with even brief physical control of the card to surreptitiously siphon all data stored on the device.

Fuze representatives said they're aware of the vulnerability and plan to fix it in an update scheduled for April 19. They also thanked the two researchers who, independent of one another, discovered the vulnerability and privately reported it. So far, however, Fuze officials have yet to fully inform users of the extent of the risk so they can prevent private data stored on the cards from being stolen or tampered with until the critical flaw is repaired.

Mike Ryan, one of the two researchers, said he created attack code that impersonated the Android app that uses a Bluetooth connection to load credit card data onto the smart cards. While the official Fuze app takes care to prevent pairing with cards that have already been set up with another device, Ryan's rogue app had no such restrictions. As a result, it allowed him to take complete control of a card, including reading, changing, or adding payment card numbers, expiration dates, and card-verification values.

https://arstechnica.com/?p=1290811

-- submitted from IRC


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by leftover on Wednesday April 11 2018, @11:06PM (3 children)

    by leftover (2448) on Wednesday April 11 2018, @11:06PM (#665613)

    I worked on projects like this decades ago, including some sizable efforts. The very first thing to get right is the security. Smart cards have more than enough capability to design comprehensive solutions. The problems start when all the versions and permutations of Point-Of-Sale software has to implement the design correctly. Never underestimate the trouble this causes! For cards that encode for multiple accounts, multiply the POS terminal implementation problems by the number of applications plus key management systems. Then you get to add the fuming nitric acid: the POS terminal software needs to have a user interface for selecting which account to use. The alternative is to have a set of prioritization rules instead of the user interface. Have fun getting the account vendors to agree on that one.

    Perhaps there is a planet out there somewhere on which such a system could actually reach operations before the "cooperating" vendors tore it to shreds. I do not believe it will happen on this one.

    --
    Bent, folded, spindled, and mutilated.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by TheRaven on Thursday April 12 2018, @06:40AM (2 children)

    by TheRaven (270) on Thursday April 12 2018, @06:40AM (#665780) Journal

    I worked on projects like this decades ago, including some sizable efforts. The very first thing to get right is the security.

    I'm guessing none of the projects that you worked on enjoyed widespread commercial success. The very first thing to get right is the UI. That's what makes people adopt your system. You can then worry about security later because it's depressingly rare for a product to fail in the market as a result of poor security.

    --
    sudo mod me up
    • (Score: 0) by Anonymous Coward on Thursday April 12 2018, @11:45AM

      by Anonymous Coward on Thursday April 12 2018, @11:45AM (#665855)

      Proprietary software dev 101.

    • (Score: 2) by leftover on Thursday April 12 2018, @11:52PM

      by leftover (2448) on Thursday April 12 2018, @11:52PM (#666251)

      My part of the UI was a gimme: Insert card in slot. The initiatives failed because each of the 'partners' wanted all of the gains. Had the projects gone on, the POS terminal UIs would have been a big problem due in part to extreme variations in hardware capabilities.

      The security design was central to getting approval from the Feds, which it did. Not a Dev 101 software project at all.

      --
      Bent, folded, spindled, and mutilated.