Anti-Hack Access Card Shields Tested

Author: Brian Rhodes, Published on May 26, 2017

Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple products claim they can keep those RFID details hidden, so we bought several examples to put them to the test, including:

  • RFID Blocking 'Security Wallet'
  • Paper and Foil Card Sleeves
  • FIPS 201 Metal Shield Card Holder
  • Standard-duty Aluminum Foil

We tested four common RFID shielding products to see which one performed the best, with a surprising result. Catch our test and demo video inside.

******* **** ****** ******* **** *********** ****** ** ******** * big ********, ********** ************ ******* *** **** ******* ******. ******** ******** ***** **** *** **** ***** **** ******* hidden, ** ** ****** ******* ******** ** *** **** ** the ****, *********:

  • **** ******** '******** ******'
  • ***** *** **** **** *******
  • **** *** ***** ****** **** ******
  • ********-**** ******** ****

** ****** **** ****** **** ********* ******** ** *** ***** one ********* *** ****, **** * ********** ******. ***** *** test *** **** ***** ******.

[***************]

Key **** ********

*** ******* ******* *** ********* ******** ***** **** *******:

  • *** *****/**** **** ******* **** *** **** ********* ******* ** the ******** ** ******.
  • ********* *** ****** **** ** *********. **** ********* ********* *** card *** ***** ***** *** **** ** ** ********* *** transmit ****.
  • *** *** ***** *** **** ********* ** ****** **** **.** MHz. *** ****** ********* ****** *** * ****** **** ******* through ****-**-***** ************, *** **** **** ******** **** ***** ********* more *********.
  • *** **** ****** ********, **** *** ************** ** **** ********* block *****, *** ********** ***** *** ***** ** ************ ********.
  • **** ***** ** *** ******/****** ******* ****** ************* ********. ****** output *****/****** ***** ******* *** ****** *** ****-******* ********* ******* that *** ** ********* *** ******* *******.

** *** ***** *** ******** *****, ** ******* ***** ******** in ******.

RFID ********* **** *****

** *** ***** *****, ** **** ******* *** **** ***** of ******* ** ******, **** *** ********** **** ********* ******** being *** *****/**** *******:

FIPS-201 ***** **** ****** ****** - ~$** ****

** ***** ** ******* ******, *** ****** ******** *** **** sophisticated *********** *** ********-*** ********* **** ********** ****** *** ******* "******** **** **** **** ************ ********."

*** **** ***** **** ***** ** **** ********* ****. ***** did *** ****** **** *** **** ** *** ****** ******* by *** ******** ***** ****** *** ********* ** *** ******, but ** *** '****' *********** **** ** *** **** ***** the ******, ***** ******** ********, ** *** ********* * ****** presentation ********, *** ******** ** *** ****. *** ****** ******* only **% ** *** ***** ** **** *************, ****** ***% when ********.

******* ****** ***** *** ******** **** ** ******* ** ******, they **** ******** **** ** **** **** *** *******, ********** side ****** ***. **** ***** *** **** ***** ** **** holder ** ** ****** ********** ****** *******.

Paper/Foil ******* - ~$* ****

*** **** ****** * ********** ****** - *** ** *** least ********* *** '******' ******** ********* *** ****.***** ~$* ****-***** ***** *********** **** ********* ** ******** ***** ****.

** ***** ** ***********, *** ******* ******* ***** **** ******* and ******* **** *********% ** ******** *** **** *** *** *** **.** *** cards. ** *******, *** ******* ********** ******* ******** ** *** card, ***** ***** * ***** ****** *** ****** *********** **** to ******** *** **** *********.

** ****, *** **** **** * ***, *********, ******** ******, but *** *********** ***** ************ ** *** ****** ** **** up **** ***** **** **** ** ******* ***.

Anti ******* ****** - ~$**

*** '******* **********' ****** ** * ******* ********* '******** ******' *** *** **** *********** ****** ******. ***** *** ******* claims "**** **** ****** ** ****** ***** ** ****-******** ********** prevents ****** ****** ******* **** ***********", *** ******* ***** **** scanning *** *** ***** **** *** ****** ****** *** ******* when *** ******* **** ***** *** ******.

*********, *** ****** ******* ***** **** *** *******/**** ***** **** faced *** ****** *** ******, *** ************ ***** ***** ********.

*** ********* **** - **.** *** ******** ** *** **** in *** ****** ************* *** *******, *** *** ****** *** successful.

Aluminum **** - ~$* *** ****

**** *** ****** *** *** **** ** *** ********* *********, when ****** ********* ********* *** ** **** **** *******? ** tested ****** ********-***** ******** **** ******** ****, **** * ***** thickness ** ***** *.* **** *****. ** *** ****, ******** less **** * **** (****** ******) ** **** *** *** an ********* ******. ** **** * **** * **** ****** shielding *** ********** ****** ** ***** ***% ** ********* *****.

** ***** ** **********, *** **** *** *** ***** ****** and **** ******, ****** *** ******** *** * ********* ****** at ****.

Migration **** **** *** *** ***** *******

** ***** ** *********** ****** ****** ******* ********* *****, *** **** ** ******* *********** ** ***** ** ***********, open *** *** *** *****. ** *****:

"*** **** *****, *** **** *** ********* ** *** minor ** ******* ******** *****, *******, *** ********* ** ***** easy ******* *** ******* *** ********* *** *****. ******** ******** should *** ******** *** ********** ** ******* ************ ********** *** 'high ****' *** *** ***** ** **** ** ******* '*** tech' ********* ********** **** *** ** *** ******** ** *** box ****** *****."

*** ***** ***********, **** ********* *** **** ** ********* **** in ****** ******* *********, ********** ***** *** '********' ****** ** moving ** **.** *** ***** ** ******. ** *** ****** options, *** **** ********* ******* **** ***** *** ********, *** far **** ** ****** **** ******** ***** *** *******.

*******, *** ********** ** ******* ** * ********* *** ** dubious. ***** ***** * ***** ****** ** ****** ***** ** inexpensive, **** **** *** ****** **** ** ***** ******** ***, and ******** *********** ****** ** ********.

Comments (5)

*************, ** ***** ***** **** ****** ** *** **** ** the ********** ** ****** ***/*** ****. ****** ***** ** * personal ******, ** ********** ***** ** **** *** ** *** solutions ***** ** ********** ** * **** ********** . *** of *** *** ******** ** * ***-******* ********** ** **** you ***'* **** ** **** *** **** *** ** **** wallet ** *****. ***** *** ** ***** ***** ********* **** benefit.

* ******* ********. **** *** ***** *** ***** **** ** back? **** *** **** **** ******? ********* *******? ********* *******?

*'* *****, * ***** *** ** *** ********* ***** ***** NOT ** **********. ****, ** * ********, * *** ** longer ********* ****. * ***** ****** *********** *** *** *** of *** ******.

* *** ******** * **** **** ******** **** ******* **** be * ***** ** *** ****.

******, ***** ** **** **** *** ******* ** **** ******* as ***** ******** ****** **** ********* & *** ********* "********" wallets ****** **** ********

*******'* ****** ********* ***** *** ******* **********? *** ****** ********** harder ** *****?

** *** ********* ********* ***** ****?

"*** ****** ********** ****** *** * ****** **** ******* ******* line-of-sight ************, *** **** **** ******** **** ***** ********* **** effective."

********, * ******* '**********' *****, ** ****** ** '*********', ** you ***** ***. ****** *** ******** ****, *******!

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
Access Control Course Winter 2018 on Dec 07, 2017
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
Hikvision UPnP Hacking Risk on Dec 04, 2017
Hikvision IP cameras are being hacked even for end users who had not set up port forwarding and believed their cameras were 'safe' behind...
ZKAccess Control Tested on Dec 04, 2017
China manufacturer ZKTeco / ZKAcces has been expanding in the West, offering a low-cost access control platform. But how good is it? And how does...
Hazardous & Explosion Proof Access Control Tutorial on Nov 27, 2017
Controlling access to hazardous environments require equipment meeting specific ratings that certify they will not start fires. Understanding those...
Top Maglock Provider Warns Against Using Maglocks on Nov 21, 2017
Do not buy my company's product. It sounds strange indeed, but a senior Allegion consultant stated that maglocks should not be used in common...
Dahua Forbes 'Next Web Crisis' Vulnerability Dispute on Nov 16, 2017
The buffer overflow vulnerability in Dahua products is not in dispute, in fact we covered it when it was first published. What is in dispute is...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
Vivotek Remote Stack Overflow Vulnerability on Nov 14, 2017
A stack overflow vulnerability in Vivotek cameras has been discovered by bashis, the security researcher who has also found vulnerabilities in...

Most Recent Industry Reports

Hiring Camera Calculator Product Manager on Dec 12, 2017
We are working on making the Camera Calculator even better and hoping you can help us find the right person to join our team. IPVM is hiring a...
Testing $20 WyzeCam, The Money Losing Amazon Vet Startup on Dec 12, 2017
This startup is perfecting the old adage: We lose money on every sale, but make it up on volume But it is no joke. The company, Wyze Labs, is...
Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks on Dec 12, 2017
The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by...
Robot Vandalism on Dec 11, 2017
Vandalism of security systems is a common concern. It is so common that camera vandalism statistics show that designers routinely sacrifice camera...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
2018 Video Surveillance Cameras Overview on Dec 11, 2017
This report concisely explains the developments for surveillance cameras offered in 2017 and the state of offerings going into 2018, including...
Imperial Capital Security Investor Conference Review on Dec 08, 2017
Investment bank Imperial Capital holds an annual Security Investor Conference where 60+ companies present, including this year: IPVM bought a...
Integrator GPS Vehicle Tracking Statistics and Success Examined on Dec 08, 2017
GPS vehicle tracking is a growing but somewhat controversial topic. On the plus side, tracking may increases productivity by providing greater...
Hikvision NA Biggest Sale of 2017 on Dec 07, 2017
Hikvision North America has been relatively disciplined the past 5 months, reducing the number of sales and the breadth of what is on sale. No...
Security Integrator IT Expertise Statistics on Dec 07, 2017
20 years ago, putting physical security systems on IP networks was just emerging. Today, almost every system is networked in some way, IP cameras...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact