TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Contactless card fraud is too easy, says Which?

7 pointsby rhubarbcustardalmost 10 years ago

4 comments

TheLoneWolflingalmost 10 years ago
I have a metal wallet. Why? Because some idiot decided that making student IDs have NFC was a good idea. Which, among other things, can be used to open doors after-hours, and buy things.<p>(And yes, it is idiotic. It replaces a magnetic strip scan (which, by the way, these cards have - which means that it&#x27;s strictly less secure now, as it still has the problems with magnetic strip <i>and</i> the problems with NFC) with a plunk the card on the scanner - which doesn&#x27;t save much of any time. And in the process means that your card isn&#x27;t secure even if you have it on you at all times and use only trusted readers. Larger attack surface.)<p>They are trivially susceptible to relay attacks, among other things. (Plunk a relay near the target, and a relay near the thing to open, where each one sends any data it picks up to the other one, which re-broadcasts it.)<p>Note: <i>any</i> NFC card is susceptible to this sort of blind relay attack. As is any buttonless key fob (like the ones on some cars).<p>Theoretically, you can prevent this by means of speed-of-light limitations, or by requiring user interaction (like pressing a button on the card itself, for instance. Although even that could be abused). But in practice, they are too cheap to build that sort of circuitry in. As usual.
评论 #9935739 未加载
davidgerardalmost 10 years ago
Everyone in the UK has these. It&#x27;s actually stupid: they replaced two-factor (card and PIN) with one-factor (NFC).<p>What I did: put my card in a fetching tinfoil hat. <a href="http:&#x2F;&#x2F;reddragdiva.dreamwidth.org&#x2F;578323.html" rel="nofollow">http:&#x2F;&#x2F;reddragdiva.dreamwidth.org&#x2F;578323.html</a> (2012) Also keeps it from interfering with my Oyster card.
评论 #9935281 未加载
dozziealmost 10 years ago
&gt; Industry body, the UK Cards Association, dismissed the findings saying Which’s report was “not a new story”.<p>So the industry body acknowledges that they knew <i>for a long time</i> that the whole thing is insecure, yet they apparently did <i>nothing</i>. This doesn&#x27;t make them look any better.
评论 #9935299 未加载
IshKebabalmost 10 years ago
It&#x27;s worse than that. They have no protection against forwarding attacks. At all. Not even basic latency time checking. Here&#x27;s a demo from two years ago:<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=t0MCFjYHieQ" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=t0MCFjYHieQ</a><p>Madness.