Viewing a single comment thread. View all comments

disruptioncoin t1_j5csmgf wrote

There was a vulnerability for a while where some researchers found that they could exceed the transaction value limit for "tap to pay" (RFID) by changing the currency on the app to a different currency (they changed it from US dollars to yen or something, for example). Typically you can only charge like $35 that way without any kind of pin or anything. They showed you could just tap your phone to someone's wallet in passing and charge thousands of dollars to their card. Imagine walking through the subway with an amplifier antenna on your phone and zapping thousands of dollars per person from every card you pass. I believe they notified the offending banks before publishing this research but still, just goes to show that sometimes these things slip though the cracks. It's probably pretty safe now but idk, better safe than sorry.

4

nitefang t1_j5dhnqq wrote

Like I said, DEF-CON proved it was possible forever ago, but there haven't been large scale operations doing long range skimming. When it does happen it is done almost like a pick pocket or via a nefarious skimmer attached to a genuine POS.

1

bad_robot_monkey t1_j5dp3s1 wrote

It’s more along the lines of “what’s the most efficient way of stealing credit cards without getting caught, equipment used on-site or a remote hack and downloading thousands at a time?”

If you’re specifically targeted, it’s a different deal…but then you have to ask yourself why you were being specifically targeted…

1