Friday, November 3, 2017

Why is there a clipboard in the secure element path?

Online wallet users access their wallet via their telephone or desktop computer, and they use cutnpaste to fill in the form.  The virus steals the clipboard contents.

Here is a clue boneheads.  Use the hardware wallet and it bypasses all the computer crap and talks directly to the exchange with encrypted transactions.

It is not like we have been watching this fiasco for five years, get a clue, kick the hardware wallet vendors in the ass. Right now this problem exists for all digital money, not just the new technology.  It is a risk for all online transactions.

Why hasn't the Fed demanded these holes be removed by going fully to intelligent secure elements? Is the Fed holding back to protect their monopoly?
The CryptoShuffler attacks commonly used transaction processes. The Trojan monitors the clipboard of the targeted victim’s device. When making a payment, the owner of the infected device copies a recipient’s wallet identification number and pastes it in the destination address line in the software they use to make the transaction. The victim doesn’t know the Trojan replaces their wallet address with the one the malware owns.When the victim pastes the wallet identification to the destination address line, they are not sending the money to the intended destination but to that of the fraudster. The process takes milliseconds.

No comments: