Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you can get enough access to read the target RFID, couldn't you just plant a device then, rather than a roadside device?


You might only have access when the vehicle is moving on the road.

For instance, you might plant a roadside reader/logger, and have an observer away from the road watching. The observer notes the time whenever a military vehicle goes by.

After you've logged a few military vehicles, you retrieve the logs, match them up to the observer's time stamps, and now you've got a list of targets for your roadside RFID based bomb.


Knowing the target RFID doesn't mean proximate access.

You might, say, attack a hardened, highly secured, professionally maintained electronic data system. Say the integrated business operations system of a large nationwide tyres-service company. Pull off the RFID and owner data.

Apply information as, where, and when desired.

And this is why, boys and girls, data are liability.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: