JavaCard、基本的にshortまでしか扱えないから65535回までなのはまあそう
July 4, 2024 at 1:21 AM
JavaCard、基本的にshortまでしか扱えないから65535回までなのはまあそう
研究で使用されたFeitian A22 Javacardはもはや利用できず、新しいYubiKeyファームウェアアップデートとYubico暗号ライブラリには影響がありません。インフィニオンは暗号ライブラリのパッチを持っていますが、まだCommon Criteria認証評価を受けていません。 (2/2)
September 3, 2024 at 9:43 PM
研究で使用されたFeitian A22 Javacardはもはや利用できず、新しいYubiKeyファームウェアアップデートとYubico暗号ライブラリには影響がありません。インフィニオンは暗号ライブラリのパッチを持っていますが、まだCommon Criteria認証評価を受けていません。 (2/2)
I'm not a JavaCard VM expert, but from my point of view, the use of a technology that *requires* bytecode to be verified off-card before installation on the card should never have been used in a card (eUICC here) that enables multiple stakeholders (MNOs/MVNOs) to install java applets on it […]
Original post on chaos.social
chaos.social
July 9, 2025 at 8:16 AM
I'm not a JavaCard VM expert, but from my point of view, the use of a technology that *requires* bytecode to be verified off-card before installation on the card should never have been used in a card (eUICC here) that enables multiple stakeholders (MNOs/MVNOs) to install java applets on it […]
原因は非定数時間のモジュラー逆転法にあります。ECDSA秘密鍵を抽出するためセキュアエレメントへの物理的アクセス(数分間のローカルな電磁サイドチャネル取得)が必要です。この攻撃によりFIDOデバイスのクローンを作成することが可能になります。リサーチャーは、Infineon SLE78を基盤とするJavaCardオープンプラットフォーム(Feitian A22)を用いて、InfineonのECDSA実装を解析し、サイドチャネル脆弱性を発見した過程を明らかにされています。また、実用的なサイドチャネル攻撃を設計し、YubiKey 5Ciを使ってこの攻撃を実証しています。👉2/3
September 5, 2024 at 1:27 AM
原因は非定数時間のモジュラー逆転法にあります。ECDSA秘密鍵を抽出するためセキュアエレメントへの物理的アクセス(数分間のローカルな電磁サイドチャネル取得)が必要です。この攻撃によりFIDOデバイスのクローンを作成することが可能になります。リサーチャーは、Infineon SLE78を基盤とするJavaCardオープンプラットフォーム(Feitian A22)を用いて、InfineonのECDSA実装を解析し、サイドチャネル脆弱性を発見した過程を明らかにされています。また、実用的なサイドチャネル攻撃を設計し、YubiKey 5Ciを使ってこの攻撃を実証しています。👉2/3
Gros plan sur la création d'une application pour une carte à puce avec notre nouvel article offert de la semaine => connect.ed-diamond.com/hackable/hk-...
#smartcard #javacard #java
#smartcard #javacard #java
May 6, 2025 at 8:00 AM
Gros plan sur la création d'une application pour une carte à puce avec notre nouvel article offert de la semaine => connect.ed-diamond.com/hackable/hk-...
#smartcard #javacard #java
#smartcard #javacard #java
Like, what the heck! I got a Java Card and the encryption keys for it were present in the listing. In one of the keys, the digit character 3 is replaced with the Cyrillic letter З (That's not a digit!). That is next to impossible to find!
#Cyrillic #Java #Encryption #JavaCard
#Cyrillic #Java #Encryption #JavaCard
June 10, 2025 at 1:44 PM
Like, what the heck! I got a Java Card and the encryption keys for it were present in the listing. In one of the keys, the digit character 3 is replaced with the Cyrillic letter З (That's not a digit!). That is next to impossible to find!
#Cyrillic #Java #Encryption #JavaCard
#Cyrillic #Java #Encryption #JavaCard
Working on a timeliness of the events leading to the development of contacless payments. It's a lot more than I expected. I think i might have to separate this into #radio detection, #SmartCard development, #NFC development, and the integration points. Might mention #java and #JavaCard too.
May 28, 2024 at 4:28 PM
Working on a timeliness of the events leading to the development of contacless payments. It's a lot more than I expected. I think i might have to separate this into #radio detection, #SmartCard development, #NFC development, and the integration points. Might mention #java and #JavaCard too.
最後に使ったのはJavaCard開発のテンプレートがEclipse用しか配布されてなくて仕方なく入れて即IDEAにインポートしてアンインストールしたとき
September 29, 2024 at 7:18 AM
最後に使ったのはJavaCard開発のテンプレートがEclipse用しか配布されてなくて仕方なく入れて即IDEAにインポートしてアンインストールしたとき
some people go out and buy a gun when they turn 18. im gonna go out and jab myself with a javacard
March 18, 2025 at 4:18 AM
some people go out and buy a gun when they turn 18. im gonna go out and jab myself with a javacard
JavaCardで素朴なつらいパソカタをやろう!
March 19, 2025 at 7:57 AM
JavaCardで素朴なつらいパソカタをやろう!
En route pour la #ndh2k13 avec @ulrich et @marcelfalliere ! Packages installés, PC, lockpick, javacard et lecteur de carte dans le sac...
November 21, 2024 at 9:15 PM
En route pour la #ndh2k13 avec @ulrich et @marcelfalliere ! Packages installés, PC, lockpick, javacard et lecteur de carte dans le sac...
Satochip unlocks DIY Bitcoin signing for <$25. EAL6+ smartcards ditch bloatware, embrace open-source. Flash a JavaCard, dodge Alibaba’s jungle—Schnorr, Nostr, Sparrow Wallet—it's all there. Question: are we decentralizing finance or just weaponizing access?
stacker.news/items/8...
stacker.news/items/8...
[DIY] Open-source Bitcoin signing device for less than 25 bucks \ stacker news ~bitcoin
Hello, This is my very first thread on Stacker.news. Even if the topic is about a brand, it's in no way a promotion for said product. On the contrary, it highlights the free, open-source nature of the solution, as well as the latest technological advances of the device. Introduction Let me introduce you to the Satochip hardware wallet—an EAL6+ certified smartcard equipped with NFC, designed to act as a signing device for Bitcoin and Nostr events. Why smartcards? Smartcards offer several advantages: Affordable and widely available; Dual interfaces - contactless (NFC) and contact (Chip); Minimal electronics, reducing the attack surface; Secure Element (SE)-based for enhanced security. What makes Satochip unique. Satochip stands out because it is 100% open-source. You can build your own signing device in under 10 minutes for just a few dollars. Additionally, this signing device has been natively supported by Sparrow Wallet since version 1.8.0. Smartcard Satochip applet The latest beta Satochip applet is available on Toporin's official Github. This release comes with: Schnorr signature support for Taproot (to be used with Sparrow-Satochip wallet) Schnorr signature support for Nostr (no key tweaking) How to use it - Bitcoin As said previously, if you build your own hardware wallet, you will be able to use it with Sparrow Wallet out of the box to sign your Bitcoin transaction. PIN code protected and BIP32/BIP39 compliant and can also be used in a multi-sig setup. How to use it - Schnorr Schnorr signatures can be tested using Pysatochip v0.15.3 command line interface: Import a private key on keyslot #0: python3 satochip_cli.py --verbose satochip-import-privkey --keyslot 0 --privkey aabbccddeeff00112233445566778899aabbccddeeff00112233445566778899 Get the corresponding publick key: python3 satochip_cli.py satochip-get-pubkey-from-keyslot --keyslot 0 Sign a hash with Schnorr on this keyslot: python3 satochip_cli.py satochip-sign-schnorr-hash --hash 796962c8f2a7b8540f818cbe37d2894b1ab4b71bccddced12e2a4dc11d8802c3 --keyslot 0 How to use it - Nostr You can sign a Nostr message then broadcast it using a specific command: python3 satochip_cli.py --verbose satochip-sign-nostr-event --keyslot 0 --message "Just discover Satochip and it's fcking great!" --kind 1 --broadcast Build your own signing smartcard Grab a compatible JavaCard Navigating the Javacard ecosystem can be difficult... There are many different configuration options that are available, even within the same chipset. For example, while there are multiple Javacards that use the NXP JCOP4 P71, it is generally the SECID versions that will work, whereas EMV versions will not. Tested and working JavaCards The following cards are readily available, tested and confirmed to work. NXP JCOP4 P71 SECID Based Javacards J3R110 J3R180 NXP JCOP3 P60 SECID Based Javacards J3H145 THD-89 Based JavaCards (these currently don't work reliably with the official Satochip builds) CodeWav NFC Sticker Tag Micro Edition THETAKey T101 THETAKey T104 (CodeWav-2 NFC Card) Javacard features required The list of tested cards above isn't exhaustive and generally speaking a Javacard needs to support the following features: Javacard 3.0.4 (Or higher) Support the following Functions javacard.security.KeyAgreement: ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DH_PLAIN_XY javacard.security.Signature: ALG_ECDSA_SHA_256 javacard.security.MessageDigest: ALG_SHA_256, ALG_SHA_512 javacard.security.RandomData: ALG_SECURE_RANDOM javacardx.crypto.Cipher: ALG_AES_BLOCK_128_ECB, ALG_AES_BLOCK_128_CBC_NOPAD Requirements You will need: OpenJDK version 8 + GlobalPlateform, the tool needed to flash the card A generic smartcard reader The Satochip applet file Download OpenJDK On Windows You can download OpenJDK 8 here Once downloaded, you can install it with all the defaults. On Linux sudo apt install openjdk-8-jdk Download the Satochip applet Grab the Satochip Applet on the official Github repository Flash the applet to the JavaCard This repository includes a release of GlobalPlatformPro which can be used to flash the applets. GlobalPlatformPro requires a working installation of Java, so if you didn't install Java at an earlier step, you need to do that before proceeding... To flash the applet using the default AIDs (which is required to work with existing Satochip compatible software) you can use the following commands. On Windows gp.exe --install ./ SatoChip-v0.14-0.2.cap On Linux java -jar gp.jar --install ./ SatoChip-v0.14-0.2.cap Applets can be uninstalled in the same way using the --uninstall command. Conclusion Satochip represents the perfect blend of open-source philosophy, affordability, and security. By leveraging widely available JavaCards, it makes secure, hardware-based cryptographic signing accessible to everyone. Whether you're using it as a multi-signature Bitcoin wallet, an affordable signing device, or a Nostr event signer, Satochip provides a versatile and trust-minimized solution. With its 100% open-source codebase, anyone can audit, modify, or even build their own signing smartcard in minutes—ensuring full transparency and complete user control. As the ecosystem evolves, the Satochip community continues to push the boundaries of security and self-sovereignty in Bitcoin and beyond. The tools are here. The code is open. The possibilities are endless. 🚀 [13 comments, 60000 boost]
stacker.news
February 9, 2025 at 12:29 AM
Satochip unlocks DIY Bitcoin signing for <$25. EAL6+ smartcards ditch bloatware, embrace open-source. Flash a JavaCard, dodge Alibaba’s jungle—Schnorr, Nostr, Sparrow Wallet—it's all there. Question: are we decentralizing finance or just weaponizing access?
stacker.news/items/8...
stacker.news/items/8...
it was @jamesmunns.com’s “Chats With James” podcast, where we chatted about Clipper and JavaCard as well as a whole bunch of other stuff. here’s the episode: jamesmunns.com/podcast/011-...
Chats with James 011 - Eliza Weisman
James chats with Eliza about systems, systems of systems, operating
systems, java, java cards, what posix did wrong, and a ton of other
rust adjacent things.
Originally Recorded on 2022-04-08.
jamesmunns.com
January 10, 2025 at 9:06 PM
it was @jamesmunns.com’s “Chats With James” podcast, where we chatted about Clipper and JavaCard as well as a whole bunch of other stuff. here’s the episode: jamesmunns.com/podcast/011-...
"guys there's an SEP backdoor that's loading javacard logic!!" brother that's for apple pay you're looking at the secure element update logs 😭
July 6, 2025 at 12:57 PM
"guys there's an SEP backdoor that's loading javacard logic!!" brother that's for apple pay you're looking at the secure element update logs 😭
As a developer, I just want to "run" JavaCard applets on a desktop machine (arm64), so of course I had to pick up the remains of jcardsim to try to add some GlobalPlatformPro UX onto it. Called it JCardEngine. Next: global platform support with oracle's sim passthrough. github.com/martinpaljak...
Home
JCardEngine - Java Card Runtime Simulator 🩺. Contribute to martinpaljak/jcardengine development by creating an account on GitHub.
github.com
July 5, 2025 at 5:38 PM
As a developer, I just want to "run" JavaCard applets on a desktop machine (arm64), so of course I had to pick up the remains of jcardsim to try to add some GlobalPlatformPro UX onto it. Called it JCardEngine. Next: global platform support with oracle's sim passthrough. github.com/martinpaljak...
i have a javacard implanted
im one of the 3 billion devices java runs on :3
im one of the 3 billion devices java runs on :3
January 12, 2025 at 3:17 AM
i have a javacard implanted
im one of the 3 billion devices java runs on :3
im one of the 3 billion devices java runs on :3
TIL that SIM cards are a full computer
like, with a CPU (32MHz, 32-bit), RAM (6KB), and a programming language (JavaCard, a subset of Java), and can run apps!
and a whole lot more interesting things
more in this talk from 2013: www.youtube.com/watch?v=31D9...
like, with a CPU (32MHz, 32-bit), RAM (6KB), and a programming language (JavaCard, a subset of Java), and can run apps!
and a whole lot more interesting things
more in this talk from 2013: www.youtube.com/watch?v=31D9...
Defcon 21 - The Secret Life of SIM Cards
YouTube video by HackersOnBoard
www.youtube.com
September 27, 2025 at 4:31 PM
TIL that SIM cards are a full computer
like, with a CPU (32MHz, 32-bit), RAM (6KB), and a programming language (JavaCard, a subset of Java), and can run apps!
and a whole lot more interesting things
more in this talk from 2013: www.youtube.com/watch?v=31D9...
like, with a CPU (32MHz, 32-bit), RAM (6KB), and a programming language (JavaCard, a subset of Java), and can run apps!
and a whole lot more interesting things
more in this talk from 2013: www.youtube.com/watch?v=31D9...
Enhance your #NFT experience by pairing them with a #JavaCard #NFC Sticker.
youtu.be/tn-53vcYlkE
#Contactless #itsecurity #cybersecurity #BlockchainTechnology #ProductAttestation
youtu.be/tn-53vcYlkE
#Contactless #itsecurity #cybersecurity #BlockchainTechnology #ProductAttestation
JavaCard NFC Sticker
YouTube video by ThothTrust ThothTrust
youtu.be
October 4, 2025 at 4:45 AM
Enhance your #NFT experience by pairing them with a #JavaCard #NFC Sticker.
youtu.be/tn-53vcYlkE
#Contactless #itsecurity #cybersecurity #BlockchainTechnology #ProductAttestation
youtu.be/tn-53vcYlkE
#Contactless #itsecurity #cybersecurity #BlockchainTechnology #ProductAttestation
October 16, 2025 at 7:38 PM
Безопасность GSMA eSIM и eUICC: уязвимости Javacard и вызовы отрасли
https://kripta.biz/posts/DCBC2BE6-6144-4FBA-A386-43AD9D219F47
https://kripta.biz/posts/DCBC2BE6-6144-4FBA-A386-43AD9D219F47
October 16, 2025 at 7:38 PM
Безопасность GSMA eSIM и eUICC: уязвимости Javacard и вызовы отрасли
https://kripta.biz/posts/DCBC2BE6-6144-4FBA-A386-43AD9D219F47
https://kripta.biz/posts/DCBC2BE6-6144-4FBA-A386-43AD9D219F47