Quote:
The problem here is that you don't understand how the encryption is done.
Wrong
Quote:And I'm not terribly sure you know what hacking is either.
Also wrong
Quote:You can't "hack" code remotely.
I never claimed you could. You hack code through brute force attacks and through looking for errors in the system. Neither is a remote function.
Quote:You can hack a system by finding a defect in security measures, but that's about it.
Um, yeah, thanks for the tip.
Quote:To hack the code itself, you have to either patch it or make changes and recompile. You could possibly come up with a scheme to use a virus to patch an executable, but with the security that would accompany this system, that is unlikely.
Really?
Who provides that security? Who maintains that security? How much will that cost?
You say:
Quote:
It doesn't need secure hardware.
If the hardware isn't secure, then it's useless.
If the software isn't secure, it's useless.
If the method of information transmission isn't secure, it's useless.
You seem to be glossing over some of the security flaws inherent within such a system.
You postulate a system - one which would be under constant attack, given the nature of what we're talking about - which is more secure than any other widely-used system that exists today. I find this to be a rather uncompelling argument.
I also agree with earlier arguments about inherent privacy for citizens, and find suggestions that the gov't wouldn't load up as much information as possible onto such a card to be, well, laughably naive
Cycloptichorn