View Single Post
Posts: 1,038 | Thanked: 3,980 times | Joined on Nov 2010 @ USA
#209
Interesting.

I liked this quote:

"The key attack, the one that's most used, is just stealing the card out of someone's mail."

I didn't quite figure out what the presenter meant by cloning transactions (possible) vs cloning cards (uneconomical). I mean, I know all the words -- I have the best words -- but I didn't quite get what he was doing with it. Not a crime-nerd, just a regular nerd I guess.

Also, the idea that places where chip "dipping" requires a PIN but chip waving doesn't seems incredibly contradictory. I mean, you know someone has physical possession of a card if they can insert it in a POS.

Anyway, the only bank card I have with a contactless feature has been deactivated by Bosch (with assistance from MagLite) JIC.
 

The Following User Says Thank You to robthebold For This Useful Post: