[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200606270457.k5R4v6gs021144@turing-police.cc.vt.edu>
Date: Tue Jun 27 05:57:19 2006
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: Sniffing RFID ID's ( Physical Security )
On Tue, 27 Jun 2006 14:24:35 +1000, mikeiscool said:
> eh?
>
> surely a RFID would only communicate it's private token with a trusted
> (i.e. keyed) source.
>
> like a smartcard ...
Well.. Yeah. That *would* make sense.
Unfortunately, some beancounter would likely realize they can shave $0.02 per
card by doing it the easy way, or that they can save $40K by hiring a
bonehead designer rather than a clued crypto geek.
If all software was actually designed and implemented to the "Surely it would"
standard, most of the people on this list, both black and white hats, would
be unemployed. Fortunately for our collective ability to cover our rent checks,
almost all software has "Surely they *didn't*" flaws in it....
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060627/a6ce3631/attachment.bin
Powered by blists - more mailing lists