IPVMU Certified | 07/29/13 02:00am
Saying 'low frequency prox (125 kHz) is unsecure' is like saying 'The Beatles are a successful band'.
Even HID agrees! I don't think the swarms of black helicopters are going to buzz you or these guys at Black Hat for thinking/talking/YouTubing about it.
In fact, HID will use the opportunity to tell you this is why it's a great time to switch to iClass (13.56 MHz) instead.
Check our Prox vs. iClass Explained post for a rundown of the differences. (Surprise! It's primarily encryption!)
The urban legend is also growing that all of your credit / ATM cards can be read through your wallet
Of course as soon as the legend spread a cottage industry sprang up for secure wallets
If paying $49.99 for that piece of mind isn't your thing, you can always make your own out duct tape
Tin foil hats are a nice way to accessorize
This is old news actually and not really an urban legend. The issue is you still have to be fairly close to read the card... duct tape does work. Identity Stronghold has been around for over 10 years I believe.
I took an RFID class moons ago while working on my masters in computer science at New Mexico Tech. The application of the technology was so amazing that I purchased the sleeves for my credit cards...did I mention my degree focused on information assurance?
Inaxsys Security Systems
125 KHz is very simple to copy/clone. It is a passive technology and is truly not secure.
In general, smart cards (13.56 MHz) are much more secure but some of the smart card technologies have been hacked/cracked already.
The 2 most common platforms that have been cracked are Mifare Classic and iClass. Online guides exist that explain very clearly how to copy and reproduce both of these card platforms.
Stay away from passive cards like 125 KHz and steer towards secure smart-card technology like DESFire EV1. Many manufacturers offer DESFire EV1 smart cards and readers.