Local Security
- RFID: Composed of a coil and a circuit. Coil is for powering the chip and wireless communication. Circuit is embedded with pregames (and data). Mostly used for resource locator.
Insecurities:- Unaware to people for no interacting is required.
- Could be abused for collecting data(position)
- Often used for ID pass, compromising RFID could grant permission physically and virtually.
Vectors for abusing RFID: - clandestine scanning: use device to scan someone’s card within his pockets.
- Eavesdropping : Use radio to analyse the communication between cards and readers for observation or reverse endangering protocol
Examples: Oysters card duplication. The transaction using Oyster cards are not real-time updated to main servers but only depends on the authentication between reader and cards.