Hacker News new | past | comments | ask | show | jobs | submit login

On a tangent - NP really need to obfuscate those ID's better. Pixellating is pretty readily reversible - you just need the base card image (find it or shop it), and you can then brute-force by iterating through numbers/letters as needed for each field, pixellating, and comparing the outputs.

Edit: in fact, as they've included two images with the same info, pixellated differently, you could almost certainly heuristically solve without brute-forcing. Eigenvectors, baby.




You reminded me of this: http://www.theregister.co.uk/2013/08/06/xerox_copier_flaw_me...

I wonder if you did reverse out her name if it would have all the right characters in it, and if it didn't, what sort of changes to would make her family heritage in the process? :)


There is nothing secret on the ID, so they didn't really need to pixelize it.


Thanks, now I need to spend the rest of the day looking for a reason to say "eigenvectors, baby."




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: