The Trouble with RFID
Mike Caulley, president of Plastic Printing Professions, a division of Document Security Systems based in Daly City, Calif., feels the fear is unjustified. “Realistically how much is that happening and what do you need to know?” he asks. “Do you need to be some sort of graduate from a physics lab to figure all that out, or is the average guy who graduated from high school going to be able to figure that out?” Right now the answer to such questions falls closer to the physicist. While Caulley’s statements are currently true, they lack forward thinking. In the 1970s stealing data off a computer would have only been possible for a computer scientist. In the early days of computers, the vast majority of citizens would not even know how to interface with the computer to do any task, let alone find security holes. These days, teenagers have been known to compromise government computers. The simple explanation for this is the ubiquity of computers and information about how they work. As the technology becomes widely available, security holes and methods to capitalize on them will become available also.
- Companies:
- Inspec Tech