Vulnerability Directory For Access Control Cards

Author: Brian Rhodes, Published on Aug 14, 2017

Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types are still widely supported, and using 13.56 MHz smartcards is no sure guarantee the format has not been hacked.

In this report, we take a deeper look at:

  • Why To Stop Using 125 kHz Formats
  • Which 13.56 MHz Formats are Uncracked (So Far)
  • The Cracked 13.56 Types Still Widely Used
  • Why No Formats Are Uncrackable
  • Thousands Are Working On Hacks
  • High Technology Skills Needed
  • Steps To Defend Against Hacks

We cover these points inside.

125 kHz Riskiest of All

While the vulnerability of specific 13.56 MHz formats is mixed, older 125 kHz are highly vulnerable to pragmatic copying with cheap and widely available components. We covered the risk in our Hack Your Access Control With This $30 HID 125kHz Card Copier test, and then how to address the vulnerability with the Hackable 125kHz Access Control Migration Guide.

Common 125 kHz Formats Are Insecure

The list of vulnerable, unencrypted 125 kHz formats used in access is substantial, easily reaching into millions of credentials still in use daily. The common formats include:

******* ***** ****** *********** *** ******** *** ** *******, ********** because **** **** *** **** *** ****. **** *** **** insecure *** *** ***** *** ***** ****** *********, *** ***** 13.56 *** ********** ** ** **** ********* *** ****** *** not **** ******.

** **** ******, ** **** * ****** **** **:

  • *** ** **** ***** *** *** *******
  • ***** **.** *** ******* *** ********* (** ***)
  • *** ******* **.** ***** ***** ****** ****
  • *** ** ******* *** ***********
  • ********* *** ******* ** *****
  • **** ********** ****** ******
  • ***** ** ****** ******* *****

** ***** ***** ****** ******.

125 *** ******** ** ***

***** *** ************* ** ******** **.** *** ******* ** *****, older *** *** *** ****** ********** ** ********* ******* **** cheap *** ****** ********* **********. ** ******* *** **** ** our**** **** ****** ******* **** **** $** *** ****** **** Copier****, *** **** *** ** ******* *** ************* **** *********** ****** ****** ******* ********* *****.

Common *** *** ******* *** ********

*** **** ** **********, *********** *** *** ******* **** ** access ** ***********, ****** ******** **** ******** ** *********** ***** in *** *****. *** ****** ******* *******:

[***************]

Formats *** *** *******

*** **** ** ******* ****** ******* ********* *** ******* ** hacked ** ***** *** ******** ***** **** *****:

*** ****** ****

***'* ****** **.** *** ****** *** *** ** ** ****** and ********* ** ******* ***** ********** *****. *******,**** **** ******* ******* ******* '**** *************', *** ******** ******* [*,*,*] ***** '** ** *****' ** ********** ** ******** *****.

****** ******* ***(********* ****)

**** ******** *** **.** *** ****** *** **** ****** ******* outside ***** *******, ** ***-********** ****** ******* *******, *** **** less-expensive ****-************** ****** *********** *** *******, *** **** ***-*** *** encryption *** ******* **** *******.

****** ******* ***(********* ****)

**** '**** ***' *** ****** ****** ** ***** ******** ********** related ** *** *********** ** ********** ** *** **********, *** does *** *********** ******** ************. ** *******, ******* ******** ** use *** *** **** **** ***, ******** *** *** *********** is **** *** *** ********* ** ********* ** ****** *******.

Formats ************ *******

*** ******* ****** ** ******** ** *** ****** ******** ** integrators *** ********. *** ******* ***** **** ** **** ** systems **** **** ******, *** *********** **** ** '******' ** access *************:

****** ******* *******

********* ********* ****** ******* ******* *** *********** ****, **** *** *** **** ****** ********** ** *** PACS ******, **** **** ***** ******** *** **.** *** ********* format ** ****. *******, *** ****** ** ********** ******** ******** keys ******** *** ******* ** *********** **********. *** ****** ** still ********* **** *********** *******.

*** ****** ***** (*** **/**** *******)

*** ****** ** ********** '****' **** ***'* ******** **.** *** format ***** ******** ******* *** ***** *** *** ********** ******* in *** '***** ** ********' *****. **** ******** ********** ********** *********** *** ** ******* on *** *****. *** ***** ***** ***** ********** ***********, ******** the **** ****** **/**** ****** *** * ********* ****** *** multiple ****** ** ********** ** ******* ******* ********.

No ******* *** ***********

******* ** ****** ** '**********' ** '**********' ***** **** *** often ********* ***** **** *** ******** ** *** ******, ** credential ******* ****** ** ****** ** '***********'. ***** ***** ******** from ******* *** ********* ******* *** ********* ** ******** ******* essentially '******* *** ***** ******' ** ********* *****, ******* ** hack **** *** ******* *** **********.

** ****** ****, *********, ** ********** ****** ****** ******* *********** secure, *** ******** ********-****** ***************** ******** ********* ** *******.

Cracking ********* ******* ** ****** *********

*** ********* *** ****** ****** ** ***** ********* ******* ********* use ******** ***** *********** **** ******* ******** ***********, ********** ***********, and ********* ***** ** ****.

*** ** *** **** ******* ********** **** ******* *****, *** open-sourced*********,*** **** ********** ** *** ***** ****:

** ****** ** ******* *** ***** ***** **** *** ********* is *** ****** *** *********. ** *** *** *** ******* fairly ******** **** ***********, ******** ***********, **** ** ****** *** ISO *********, **** ****** **** ******** ***** *** **** *********** than ******** **** ! ***** **** ** *** ********** *** basic ********** ****** **** *** **** ********** ***** *** ******.

*** ***** ******* *** *** **** ******** *****, **** ****** not ****** * '***** *** *****' **** ******, *** ****** a *** ** ********** **** ******* **********, ********, *** ******** that **** ** ********** ******** *** ****** ********** *******:

**** *** ***** *********** *** *** *******, *** *****, *****-****, and **** ** *** ******* *********, **** ***$** **** *** *** ******** ****** **** ********* *******:

*******, *** *** '***** *** *****' ******* *** ***** ** access *******. *** *******, ** ****** ********** (**.*****) ********** *** *** **** **** ****** ****** *******, ******* *** claims ** ******* ********, ********* *******:

The ******* ********* ** *****

******* ** *** '*********' ********* ** ********* ********** ** ******* mechanical *****, ***** *** ********* ****** *** ******** *********** *** contribute ** ******* ****** ***********.

*** ** *** ****** ****** ***** ***** ***** ****** ** the******** ********** *********, **** ********* ** ***** *** ******** ** ***** ***** month, ***** ************* ******* ** ******* ******** *** ******* *** multiple ******* (********* ******, ******, *****, *** *** ***********) **** place.

***** ****** *********, **** ****** ********* *** **** ** ******. Multiple ******* ******** *** ** ***** ** ******, * ***** and ***** ****** ************* ****** ** ***** ************. ***** ***** are **** ******** ** ********** ********, ** ******* *** ***:

******* *******

Significant ****** *** ** ********

******* ********* *** ********* **** ** ******, ** **** ******** access *** ************ ** ********* ** ***** ******. *** *******, one ** *** **** ******** **** ******* ** ********** ******* keys **** ****** ******* ******** ********** ****** * ******* ** splicing *** ****** **********.

*** **** ****** *******, *** ********** *** **** ****** ** use **** ****** ** * **** ************* ********* *** ****, as *** ****** ***** ** ****** ******** ** ***********.

*** **** ******** *** **** ******* ***** ***** ***** ** processing. **** ******* *** **** ** *** ** * ******* (with *********** ***), ***** ****** **** ******** ***** ** **** **** (**** the***** ***** **** ******* ****).

High ***** **.** ****** **** ** ***** *******

*** *** *********** ** **** **** *** **** ***** *** devoted ****** **** ** ***** ********** *******, *** ******* **** to ********** ****** ******* ** ******** *** ******* ***** ***** takes ****.

*******, *** $** *** *** ****** *** ** **** ** seconds *** ****-********, ** ***** ******* ****** ** *******. *** for **.** *** *******, **** ***** ******* ******, ***** ** time, ******** ****, *** ******** ************ ** ******* ** ***** required.

*** **** ********* ******* ******* *******: ******** ***** ************** ******* of **** ****, '**** ***' **** **** ********, ** *** reissue ***********, *** **** ***** **** **** *** ********* ** installed ******* *** ***********.

Comments (22)

***** **** ******** **** ** ****** ***** :) ***** ** still *** ************* ** ****** ** ********** ***** **** ** also *** *****. ******* ************ *** *** ** ******* ********* a *** ... ** ***** ***** ** *** **** *** to *** **********.

*** ** ****** **** *** ****** ** * *** ** people (****** ********). ** ****** ***'* ******** *** ***** ******* to **** *************** *** *** "***** *** *****" **** ** that **** ** **********.

*** ***** **** ** ******** ** ********* ** ********* ***** day. ********* ******** **** *** ********** ** ** **** ****** peer ****** *** ******** ****** ****** *** ****.

***

***** *** *** ** *** ********** :

****://***.*************.***/****-***-***-********

*** ******** **** ******** ********* (************) *** *** *** ** sim **** **** "***" *******. ** **** *** ****, *** high ******** ***** ***** *******...

*****

*** ***** **** ** ******** ** ********* ** ********* ***** day. ********* ******** **** *** ********** ** ** **** ****** peer ****** *** ******** ****** ****** *** ****.

**** ** *** *** '*****' ********* ******'* '***** ** ********'****** *****. ** ******** **** **** ******* ****** ** * particular ***** ** **** ** * ***** ***********, ****** ******* used ** ***** ***** **** ************ (**: *** ****, ***/***** passes) ***/**** ** ******** ******* ******** ******.

***** *** *** ******* *** **** ** *** *******.

* ***** ** **** ****.

***** *******,

*. *****'* ****** *****. * **** ** ** **** ************ iClass *********** *** * ******** ******** *******. ** ***** * bit ** ****** *** *** *** **** *** **** ***** require ******** ******* ***** *******.

**** **** *******, * ****** ** ******* ******, ***** **** links ** *** ********* ***** ****** ** **** ** ******, ( * ***** *** ******** ***** ** **** **** *******) and ****** *** *********** ****** **** *** ****** ***** *** weak ** *** ** *** ******** ** *** ********** *******, which ** *** **** ***.

**** ******* ** ******** *** **** ** **** ******, *** cryptographic ****** *** ** ******, *** *** ******* *** ** do **** ** ** ****** *** ****.

*** **** ****** **** ** *** ********* ** ********* ***/*, a ****** ******** ** ** **** ** *** ***** ******* on *** ******** *****, *** ***** ** *** *********.

**** *** ******* ****** ******** ** ** **** **** *****, which *** ** ******** *** ****, *** **** ** * XP *******( **** ******** *** **). * **** ******** **** package ** **** ** **** **** ********, *.*. ** ********** site ***** ***, ******* ***********, *** ******.

****** *** *** ******** ****!

** *** **** * ***** ** *** ********* ********** ****** SE **** ***?

** ******** ******** ******, * ****** ******* ******** *** **** partially **********, *** ***** ** * **** '*****'.

** *** *** ****, ** ** *** ***** * ***** is ***** ******** *** ****?

****** ** ** ********* * ****** *********** ** ******** *******. In ****** *** ******** ********* *** *** ** ***** ***** similar ******* ** *** **** *** *** ********* *******, *** then ***** ** * ****** *********** *** *********, ***** ** currently **** *** ******* ** *** ******. ****** *** ******* utilise * ****** ************** ******, ***** ***** ** ********** ** Side ******* *******, ** ***** **** *** ****** ****. *** from ** ************* ***** ******* * ****** ********.

******* *** ****** *********** ** ***** ******** ** *** **** and *** ******* **** ******** **** **** ** *** **** for *** ** *********** ** ********, *** **** *** ** achieved **** *** ***** ****.

********, **** *** ********* *** ** ***** *** ****** *** be ******** ***** * ********, *** ****** **** *** *** contents, *** *** ***'* **** ** ** ******* **** **** you **** *** ****** ** **** ***** ******** ** *** back ** *** ****....

**** ** ******* ** *** ******, *** *********** ******* ******, except **** *** *********** ** *** ******* *** ********* *** CSN, ** ******* * ******* ** *** ******** ** ******* soft ******* *************** ** ********, *** ****** ***** ** ** focussed ** ******** ***/* **********. ** *** *********** **** *** likely ** ****** ******.

********** ****** ** ***** * *** ******* **** ******** *******, and **** ******** **** *** ****** ******** **** *** ************* have ******** **** *** **** ** ****** *** ******** ****** on.

* ***** ******* ***** ********** **** * *****'* *** ****** to **** ** *****, *** ***** * **** **** **** allowed ****** *********, ********* *** ****** *** *** **********.

** * ******** ****, **** **** * **** *** **** looks **** ****, *** * ** **** ********* **** *** won't **** *** ******* ** ******, ** **** **** *********** under ***, ** **-*** ***** **** ** ******** **.

**** * ***** **** ********* ** ** ******* ***, *** we **** ** ***** ** ********* ******** **** ** ***** counters **** ** ********* **** ** ****, *** ******* ***'* put **** ** *******.

***********. **** *** *******, ** ***** ** *** ********** ** divulging *******, *** ****** ********** ***** ** ** ******* *******. Even ***'* ** ****** **** ** ****** ***-********* ********* *** often ***** *** *********** ** *********.

****** *** *** ********!

* ***** ******, **** ********* ** ** ***** **** ******, is ******* ***** *** ** ***** ** ***** ****** *** i-Class ** ******. ***** ***** *** **** ** **** **** both *** ******** *-***** ******** (********* ******* **** * **** number ********* **** * *) *** *** ***** *-***** ** platform **** *** * **** ****** ********* **** * *. The **** ***** **** **** *** *** ***** ****** ******* are ******** *** ****** ******* ** *** ****** *** ** disabled ** ******. **** *** *** ****** **** **** ******* on *** ****** ** **********. ** ** ******** *********** **** any *** **** **** *** ** ******* *********** **** *-***** SE ******* **** *** ****** ****** ********.

* ***** ***** **** **** ** *** **** (** *****). But *** ******* **** ******** *************** ** ****** ** **** it ***** ** ** **** *******, ******** ** ******* ** Mifare *******, *** ****** *** ** *** ******* **** ********. Why ***** *** ******** ** *** * **** ** *** DES ************** ***** * ******* ** * **** ( ****** read & *****), **** * ****** *** *** *** ****** (EV1/2) ** ********* **** ******** ****, ***** *** ****** ****?

********** **** *** ************ ** **** ******* ******* **** ** Proxmark, ***** *** ******** * ****, ******** *** ********** ** a ****** *** *** ****.

**** ** *** *** ******** *** *******, *** ***** ** you *******, *** *** ******* **** ******* ***/* *** *** cards *** *******.

** *** *** ******** *** *******, **** **** ** ******* OSDP.

******, *** *** ****** *** ***** ***** ***/* ******* ** Seos? ** ** * ********.

** *** *** ** **** ******** ******* *** **** "*** would **** ************ ** ** ******* ***", ***** "**", * believe, *** *********** ****. * ***** ** ********. *** **** even ** ****? *'** *** **** ******** **** ****.

** ***** ** ** **** **** ** ****** ****** *** well ********. *'** **** ******** ***** ** **** ****** ** remain ****** **** ** ****** ******* *** *'** ***** * don't **** ****** ***** ****** ** **** **** ** ******** guess.

* ******* *** ********** ** *** ************* "****-*******" ** ******* which **** **** **** ***********. ** *** *** ***** "********-*******" SE ******* ***** *** **** ***** ** ****** *** ****** are *********. **** ******** * ****** ********* **** *** *********** to ****.

******* ***** * ******* ******* ***** ******* * ********** **** older ***********, ** ****** ******* *** **** ***** ******** ** used, *** **** *** ********* ** *** **.

*** **** ************ **** ** ***, ****** **** *** ******** (I ******* **** ** * ******** ***********) ** *** ****** to ***** **** *** *** *********, *** ***** ***** ********** is ******** **** ********* **** *** ************ ** ***** ** is *******.

********* ** ***** ** ***** ************, ** **** ** *** questions **** **:-

*** ***** ** ****?,

**** *** **** ******?,

** **** ***** ** ***** ******** ****?,

*** **** ** ******** *********?

*** *** * ****** **** ** * ******?,

*** *** *** ************* ******** *** ******** *** ******?.

*** **** ***** ** ********** ********* ** ** *** ** this *****, ** ***** *** ******** ** *********, ***** *********** to ******** *******, *** ******* ********* *** ***** **** **** their *********. ************ ** **** **** *** ********* ** ******, and *** ************* *******.

* ***'* ***** ** *** ** ****** ********* ***** ** "It ***** ** ** ****" **** *** ********* *** ******** that *** ***** ** ** * ******** ** *****?

*'* *** ****** *** ********* ** **** ** **** ****** pretending ** **** ** **** ** ******. **** **** ** cursory ******* ** ***** **** ******* ***. * ********** ****** **** ***** ******** ** ****. *** **** ******** translate ** ********* ****** ******. ** *** ** *** ** security ***** **** **** ****** *** *** "************ * ****** and ******** **********" *****'* **** ** *** "*********** *********". *'* certainly *** **** ********* *** ** *** *****. ************* *** is ****** ******** ** *** ** *** **** ******** ******** vendors *'** ****** ** ***'* **** **** ** ******** ***** NXP, *** ***** **** ** ************* ** *** *** ***** details ** *** **** ****.

** *** ** *** **** *** *********. ** ************* ** that **** *** **** *** ****** ******* *** (*** **** about ***) ********* ***** *** ** ******* **** *** **** if *** ** ******. * ******* **** *** **** ***** investing ** ********, ********, *** "*******". *** **** **** *** common ******** ** *** ****** ******.

* ******* **** *** *** ********* *** *****, ***** ***** keys *** ***** ** ** ****** ** ******* ** **** as ***********. *** ** *** ******* **** * ***'* **** of ******** **** *****'* ******* ****.

**** ******* *** "***********" *******. **** ************ ****** **'* *** master ***. *** **** * **** ****** ***. ******* ****** the **** ** **** **** **** *** ***. **** ***** it *** ***. ****, * *******, *** *** **** ******** encryption ********** (****, ***, ***).

*'* *** **** ***** "******** ********** ****". * ***** ******* both *** ******* ****.

*** *'* ****** ********* ******* *** *** **** ******* ******* review ********* *** ************** ** ******* ********. * ******* *** hasn't, ***** ******'* ** **** **********.

** ******* ** **** ** **** ** ********** ****. ******* 1) *'* **** ********** ** *** ***** *** *) *'* actually ******* ** * ******** *** ******* **** ** *** conclusion ** ***** ** **** ** *******. * **** ** hard ** *** * ***** ******* ** *** ***** ******* of **** ********* **** * ********* *****. *** *** ******* I ******** ***** ** ****** **** ** **** * ****** who *** ******* ** ***-**-*** ******** *** ******* ** ** me (*******, ***********, ********, ********, ***).

*****, ** ***** ** ***************, * ***** ********* ***** *** with * ***** **** ****** ***, **** ****** ******** ************ to ** ********* ** *** ****.

*********** * ********* * ***** ***** *********** ** **** ****** the *** ********* ****. **** *** ** ****, ******* ********** or *******.

******* ** ****** ***** ****** ******* ** * *********** ****, i.e. ** **** ** *** ******.

** *** **** *** *********, *** ****** ****** **** ***** for *** ********.

******** **** ** ********** *** ******* * ***, ***** **** be ******* ******* ** *** *** *** ****** ************.

** (***.*******.**.**) **** ******* ** *** ** *** *** *** credential ********** ****** ***** ** *******, *** * ** ***** of ** ***** *** ****** ***** ** *** **** * Platinum *******.

** ** ********** *** **** ********* ***** ***** ******** ** go "*****" **** ********** ** ********, *** **** ******* **** in ****-****** *****.

**** **** ** ********* (*.*. ** *** ***** *** ****) yet **** ** ******* ** ***** ********* ** *** ***** of *** ******* ** * ***, *** ** ********* ** suitable ********* *** ***** *** ***********.

****** *** *** ********! *** *** ******* ** * *** more **** ** *** **** *****

"******* ** ****** ***** ****** ******* ** * *********** ****, i.e. ** **** ** *** ******"

* **** ** **** **** ****** ***** ****. *** ** this ********? ** **** *********** * ****** ******* *** ****** and ***** **** ***** *** **** ** **** **** ****'* in ** ******* ****?

****** ** *** **** **** ********* ** *** *** **********. There *** * ********** *'* ***** **. ***** ** ** understanding *** ******* ** **** *'** ****/********* ********* *** ******.

******** ********. **** ** *** *** *** ***** ******* ***** the **** *** *** **** ****** *** ******* *** *********** regardless ** ****/*******.

*****/***** **. **** ** *** ******* ***** *** ******* * custom **** ******** **** ******** *** *** ***. **** ******* and ***** **** ** ******* ******* **** *** *** *** programmed **** *** *******. * ******* *** ** **** ******* your ********** *** *** *** ********** ** *** *****. ***** you're ** ****** ***** *** ******** ***, *** *** ***** trusting *** ** **** ****** *** *********** * ***** *** of **** **** *** *****.

****** **** ********. **** ** *** **** ** *** ***** except *** *** ** *** *** **** ******* *** ***. Obviously **** **** ******** *** *** ****. ***'** **** ********** hardware/software. *** *** *** ***'* **** ** ***** * *** party **** **** ****.

******* *** ** ********* ******* *** ******* ***** **** ******* configuration ***** ** *** ****.

*****/***** ** **** *** ** *** *** *** ***** ** the ********. ****** *** ******* *** ********** ** *** ******* as ****.

*** ****** **** ******** **** ******* ** *** ******** *** also ** ***. **** *** ******* **** * *** *** user ********* **** ***** **** ******** *** ***. ******* ** this, *** *** **** **** *** **** ********* ** *** actual ** *** ***, **** **** *****. * ******* *** Elite ******* ******** ******* ** ********* ** ****, **** ** the *** *******.

* ***** **** **** ****** ******** ** *** ********* ** who *** ** ****, *** **** ** ******** **-*******, *** how ** ****** ****.

****, *'* *** ******** **** ** **** ** ** ***, I ***** **** ***** ** ******.

*****, * ******* *** *** ********** *** ***** **** ******, which *** *** **** ******* ********** ** *** *** ***** which ** ***** ** *** *** ***.

** ** **** ** *** ******* *****, **** ******* ******** to *** **** ** ***** ******** ******* ** ***** * paraphrase, ***** *** **** ************ ** ****** * **** ******, which ** **** ** *** **** ** ****** * ****** random *** ** *** **** (** **** ** *****) ** control *** ***********. *** *** *** ** ****** ** * tightly ******* *******, ***** ******** * *** ***. *** **** client ******* ******* * ****** ******** *** ***, ***** **** control, *** *** ***** **** ****** ***** *** *** ****** set *** ****** *** *** ********** *********** ** *******, ********* the ****** *** ****** *****. **** ******* **** *** ******* is ********** *********. *** ****** *** *** ****** ***** *** be ********* **** *** **********, ***** ****** ** **** ***** and *** ** ****** ** * ******* ****, ** * controlled ****, **** ******* *** ** *** ***** **** *** key ****** ***** *** ****/******. * **** *** ** ** this *** ******* **** * *** ******.

** ** **** **** ** *** **** *****, ***** ** available ** ********** ***** *** *** ********, ** ** ** anonymous, *** *********** ** *** ****** *** **** *** **** approved ** *** **** ** *** ** (******** ********** ** NIST), *.*. **** ********** ******** ** * ***** *****. *********** can ****** **** *********** *** *** *****, ** ***** *** users *** ** ** **********.

** ** *********** *******, *** **** *.*.* ******** ****, *** I *****'* **** ** ********* ** ****** ** ******* (*** union ** ****/******* **** ******** ********** **** ***** ***********), *** Deister ********* **** * ****** ****** * ****** *** ***** can ******* *** ** ***** ******* ** *********** ******, ******* only ***** **** *** ******, *** ********** ** ****, ****** a ***-**** *** ** **** *** ****** *** *** * reader, **** ****** *** **** ****** ******* (** **** **** this ** ** ** *** ****** *** ** ********* ** the **** *******) ** * ****** *****, ** ****.

**** *** ****** ******* ** ******* ****** *******(***), ***** ** an ********* ***-*********, * **** ***** **** * * **** panel **** * ***, *** *** ****** ************ **** ******* on ****** ******** ** ***** ********* ******, ** **** **** news, ** **** ********** ******* ** *** ******** ****** **** security *** ** ******** ** ********.

*** ******* *** ********** ****** * *** **** **** *** does **** *** ***** ** ******** *** ****** *******. *** encoder *** * *** ******. **** ***** * ***** **** sounds ********* ** ** ** *** "******** *** ***". * think *** **** ***** **** **** *** ******** ******* **** they *******. *** **** *** ******* **** **** **** *** custom ****. ******* *.******** ******* *** **** **** **** *** ****** ******* ** the ********.

* ***** *** ****** **** ** *** **** ** *** list ** "*** *** *******".
** ** **** ***** **** ****** ******* (***** ** ********** with **** *** **** **** ********** *** *** ******** ** physical ****** *******) ** *** *** *******.

* ***** **** *** **** ****** **** ** **** **** open **** *** *********, ***** ******* ** *** ********* **** complete ******** *********** ***** ***** ****** *** ** *********. ***** is ** "******** ** *********" ***** ** ***, ** ** based ** ****** *** ******. ** *** **, ** ***** much **** ********** **** * **** **** ********** ****** *********** HID *********.

***, *'* ** ******, ** ***'* **** *** ********* ****, Mifare ****** ***** ** *********** ****, ** ******* ** *** own ******* *** **.

*********, ** ** *********** **** *** **** *** ********** ******* NXP *** ***, *** ** * ********, ************ *** ******** of ***** **** ********* **** ** ****** **** *** *******, whereas *** ******* *** ************ ***** *********. *** ****** ******** was ******** ** ****** ****** *** **** ********** ** ********. Therefore **** ** *** * ***** **********.

**** ********** ** *** ***** ** *** ******** *** ***** to, *.*. *** *** ******* ** ********** ******* *** ** selling ** *** ***** *** ***********.

* *** *** ****** ***** ** ***** ****** **** *** Access ******* ************, ** *** **** ********** ******* ****** **** and ******* ** ********** *****, ********* ** ********** ** *** cost ** *** **** *** * ********* ****, *** *** readers *** ** **** *********. *** **** ****** ** *** Mifare **** ** ** *** ********* **** *******, *** *** problem **** ******* **** ********* ******** ****** ******** ****** *******, providing * **** **** *** ************.

***** *** *** *** ******* ***** ***, **** *** *** for **.

** ** *** **** ***** ** *** **** **** ***** is ** ******* *************, ******* **** *** ** ********** ** be * "**** ****".
***-**** ******* (***** *** **** *****) ** **** ** ****** are ******** ** ****, *** ******* ** ****** ***** *** companies *** ********* **** *******, ** *** **** **** ********* cost ***********.

* **** **** ******* ** **** ******* ** ******** ****** control ** ******* ***** **** ****. **** *** ***** ***** DESFire ** ***** "*******" ****** *** * **** ** ***** that **** ** **** ** ****. * ***** ********** ***, is ***** ********* **** **** ********** *******?

** *** *** ** ***, ** *** *** ** *** day * ***** * ***** **** * ***** ** ******* NXP-based ***** **** *** ****** *****. ********* ******** - * never ******* ** ******* *** **** ********* ******* *** ** HID (*'** ***** * ****** ** *****), *'* ***** ** speak **** ****** ****** ** ****** **** *** **** ****** me **, *** **** ***'*, *** *'* *** **** ** works **** *** **** **** ** *********. * **** ** trust ****, **** ***'* ***** ** *** ***** ******. ** for ***-***** ******** *'* ***** *** * **** ************ ******, just * ***, *** ** ** ********* **** ********** *** me, ****'* *** ** ** **** *********** *** ** *** I *** ********* ** ** *********. ** *** *** ** the *** * **** *** *** * ****** ****** *** I ****** ******** ***** *** ** ***** ******* ** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Measuring For Security Installation Guide on May 15, 2018
Accurate measurement is a fundamental skill, yet many installers do not know how to do it. Using these tools are a key skill needed for security...
Genetec Clearance Face Detection / Redaction Test on May 14, 2018
Privacy regulations such as GDPR (EU Public Privacy), HIPAA (US Medical Privacy), and FERPA (US Student Privacy) are driving video surveillance...
Hikvision Source Code Transparency Center Examined on May 14, 2018
Following criticism of Hikvision's Chinese government ownership and Hikvision's IP camera backdoor, the company has responded with a series of...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...

Most Recent Industry Reports

Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...
Dahua 12MP Fisheye Camera Tested (NK8BR4) on May 16, 2018
Continuing our coverage of 12MP sensor fisheye cameras, we bought and tested the Dahua NK8BR4, examining: Default vs. Optimized...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact