Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share This URL With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

Links 1 through 10 of 34 by Justin Mason tagged rfid

'When demonstrating FareBot, many people are surprised to learn that much of the data on their ORCA card is not encrypted or protected. This fact is published by ORCA, but is not commonly known and may be of concern to some people who would rather not broadcast where they’ve been to anyone who can brush against the outside of their wallet. Transit agencies across the board should do a better job explaining to riders how the cards work and what the privacy implications are.' (via Boing Boing)

Share It With Others!

also, an RFID "jammer" to block reads of RFID chips within range. related: the Israeli govt is considering voting cards with RFID chips, apparently

Share It With Others!

as predicted: 'Zipping past Fisherman's Wharf, Chris Paget's scanner downloaded to his laptop the unique serial numbers of two pedestrians' electronic U.S. passport cards embedded with radio frequency identification, or RFID, tags. Within an hour, he'd "skimmed" four more of the new, microchipped PASS cards from a distance of 20 feet.'

Share It With Others!

an e-Passport for "Elvis Aaron Presley", no less, happily scanned by an Amsterdam passport security station. hahahaha!

Share It With Others!

hacker group THC release an RFID-passport cloning/modification tool, noting that e-Passports are fundamentally insecure due to their trust of self-signed certificates. Also raises the Smart-IED attack danger: 'A Smart-IED waits until a specific person passes by before detonating or let's say until there are more than 10 americans in the room.'

Share It With Others!

a fantastic prez by 3 MIT students working under Ron Rivest, successfully hacking the Boston subway system's stored-value magstripe cards and MIFARE Classic RFID cards; really fantastic walkthrough of the process. I'm glad to see that my smartcard work on other systems a few years back would have defeated many of these attacks ;)

Share It With Others!

by the Dutch team behind the crack of the Dutch travel card, based on the same MIFARE system as London's Oyster cards. paper coming in October

Share It With Others!

'What the fuck? We all need to check Subsection 2.4.8 on baby chipping. This is serious shit.'

Share It With Others!

maliciously-formatted data in an e-passport's RFID tag can crash border passport scanning systems, with a possibility of being able to inject code. This right here is why sometimes too much data interchange can be a bad thing for security... brilliant

Share It With Others!

design, implementation and evaluation of a personal RFID firewall device. This paper won "best paper" at LISA'06, and deservedly so -- this is a fantastic concept, and one that really will be necessary, too

Share It With Others!