An increasing number of ATM skimmers targeting banks and consumers appear to be of the razor-thin insert variety. These card-skimming devices are made to fit snugly and invisibly inside the throat of the card acceptance slot. Here’s a look at a stealthy new model of insert skimmer pulled from a cash machine in southern Europe just this past week. The bank that shared these photos asked to remain anonymous, noting that the incident is still under investigation. But according to an executive at this financial institution, the skimmer below was discovered inside the ATM’s card slot by a bank technician after the ATM’s “fatal error” alarm was set off, warning that someone was likely tampering with the cash machine. Code: http://news.hitb.org/content/stealthy-razor-thin-atm-insert-skimmers
that would be entirely up to the person using the skimmer to implement on their own. it would have have its own storage or else be connected to a local host in order to read/copy the data read from the magnetic strips of the cards. you could then modify the data and write the data to another card.
Which are all easily accessible via, IRC,TOR, Counterfeit. This 'card skimmer' is a huge game changer.
need to look into how cv2 can be added after the event... or how pin can be deduced aftet the skim is complete without a camera at the time. or how some uber n00b haxor on irc will tell me any of that without direct involvement in the procedure. i reckon there is a future in terminal coupling which will store the card/bank connection data in sync wiith even a basic skimmer. maybe it just depends on what method the card would be used for.