How is a secure connection between an ID-card and the server established?
We will explain how the secure connection between an ID-card and the server is established and shed some light on the possibility/impossibility of man-in-the-middle attacks upon the creation of this connection.