
NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS This is in contrast to previously documented methods of keypad snooping these methods were in general either highly intrusive - required close presence or installation of specialized hardware - or difficult to carry out and not very reliable (e.g., examining deposited fingerprints - works in low-use situations only, and does not reveal the ordering of digits).While the information presented in the accompanying Octointerim consolidated financial statements is unaudited, it includes all adjustments which are, in the opinion of management, necessary to present fairly the financial position, results of operations and cash flows for the interim period presented in accordance with the accounting principles generally accepted in the United States of America. This attack enables the attacker to quickly and unobtrusively recover previously entered passphrases with a high degree of success.

But most of all, I just wanted to share -) In short, virtually all keypad entry systems - as used in various applications, including building access control, alarm system control, electronic lock safes, ATM input, etc - are susceptible to a trivial low-profile passphrase snooping scheme. Although this paper's findings are hardly groundbreaking (and in some ways, are downright obvious), it includes some cool pictures of what should be most certainly taken into account in risk management, secure zone planning, and when drafting operating procedures for high-risk areas.

Cracking safes with thermal imaging Cracking safes with thermal imaging (as a more viable alternative to mind reading) Copyright (C) 2005 by Michal Zalewski This inexplicably brief 'research' paper presents an interesting physical world attack that may be easily deployed by a determined attacker to compromise many high-security access control systems in use today.
