Skip to comments.
RFID tags vulnerable to viruses, study says
Computerworld ^
| 03/15/2006
| Jeremy Kirk
Posted on 03/15/2006 9:23:38 AM PST by Ramius
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-60, 61-80 ... 101 next last
Swell. Just swell. But finding the vulnerability is the first step. Should be ways to deal with it, I'd think.
1
posted on
03/15/2006 9:23:41 AM PST
by
Ramius
To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...
2
posted on
03/15/2006 9:29:48 AM PST
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: Ramius
Should be ways to deal with it, I'd think.I sure hope not. The sooner RFID gets exposed for the huge threat it is, the better. I think this is excellent news.
3
posted on
03/15/2006 9:30:07 AM PST
by
AntiGuv
To: AntiGuv
Uh, yeah... OK. And bar codes. Don't forget bar codes. :-)
4
posted on
03/15/2006 9:31:42 AM PST
by
Ramius
(Buy blades for war fighters: freeper.the-hobbit-hole.net --> 1100 knives and counting!)
To: Ramius
You cannot hack a bar code.
5
posted on
03/15/2006 9:32:25 AM PST
by
AntiGuv
To: Ramius
6
posted on
03/15/2006 9:33:04 AM PST
by
Calpernia
(Breederville.com)
To: Grinder; freepatriot32; prairiebreeze; tiamat; Ladysmith; Alas Babylon!; Malacoda; vrwc0915; ...
7
posted on
03/15/2006 9:34:13 AM PST
by
Calpernia
(Breederville.com)
To: AntiGuv
Sure you can:
http://www.azalea.com/
There's tons and tons of bar code software packages out there, read em, print em, do whatever you want with them. Can't transmit a virus with them, but I doubt you can really transmit a virus with RFIDs either, too many variables, not enough space. It's a theoretical possibility sure, but as for really doing it we're talking a serious inside job.
8
posted on
03/15/2006 9:35:48 AM PST
by
discostu
(a time when families gather together, don't talk, and watch football... good times)
To: AntiGuv
I sure hope not. The sooner RFID gets exposed for the huge threat it is, the better. I think this is excellent news.
Even better news is that RFID may be defeated. When they put the tags with "666" on our forehead we'll be able to recode them to destroy the system.
9
posted on
03/15/2006 9:36:33 AM PST
by
StoneGiant
(Power without morality is disaster. Morality without power is useless.)
To: PatrickHenry; b_sharp; neutrality; anguish; SeaLion; Fractal Trader; grjr21; bitt; KevinDavis; ...
FutureTechPing! |
An emergent technologies list covering biomedical research, fusion power, nanotech, AI robotics, and other related fields. FReepmail to join or drop. |
|
|
|
10
posted on
03/15/2006 9:37:01 AM PST
by
AntiGuv
To: Ramius
Have we really sunk to this level in terms of programming?
Some idiot is really writing an app that harvests a piddly amount of data from an RFID tag an he can't even validate it first before he passes it on to lord know how many other COM, .NET, "Where do you want to go today" objects?
Its sad really.
To: AntiGuv
You cannot hack a bar code. Of course you can. With a sharpie, no less.
12
posted on
03/15/2006 9:40:36 AM PST
by
Ramius
(Buy blades for war fighters: freeper.the-hobbit-hole.net --> 1100 knives and counting!)
To: Ramius
Have you already seen
this?
13
posted on
03/15/2006 9:41:34 AM PST
by
kevin_in_so_cal
(http://www.boycottmadeinchina.org - http://www.olympicwatch.org)
To: Ramius
Any program that takes external input without limiting input length is just begging for trouble. You can't have a buffer overrun attack without sloppy programming. This is a problem with the RFID receiver and the computers it is attached to not the RFID itself.
Just imagine being able to print your own UPC symbol with more than the allowed number of bars to break into a cash register's computer. This is similar. You can't count on RFID chips to only come from "friendly" suppliers.
Previous bosses have complained about by tendency to use strncpy and manually placing a '\0' at the end of the space allocated for a string instead of just using strcpy and letting the function do it. Taking the shortcut is how buffer overruns occur.
< /programming geek mode>
14
posted on
03/15/2006 9:42:10 AM PST
by
KarlInOhio
(The tree of liberty is getting awfully parched.)
To: discostu
Fair enough, then I will be tediously more precise. You cannot steal anyone's identity using barcodes. You cannot monitor anyone's activity in any meaningful way using barcodes. You cannot compromise anyone's privacy in any meaningful way using barcodes. You cannot track anyone's whereabouts using barcodes. You cannot threaten anyone's well-being using barcodes. In fact, there is very little that any normal person or entity would want to do that can be achieved by hacking barcodes.
15
posted on
03/15/2006 9:42:42 AM PST
by
AntiGuv
http://www.freerepublic.com/focus/f-news/1563271/postsHealthy People 2010 Before Bill Clinton left office, he authorized 2001 an 84% increase in the government's investment in nanotechnology research and development, National Nanotechnology Initiative (NNI) http://clinton4.nara.gov/WH/New/html/20000121_4.html and made it a top priority.
- This governmental increase has been combined with non-governmental organizations (NGO) and grant programs. These NGOs have been creating partnerships with existing governmental agencies and masking initiatives as Federal and State grant reward programs. They are not.
- Here, at the CDC is an overview of what is called, Healthy People 2010 http://www.cdc.gov/nchs/about/otheract/hpdata2010/abouthp.htm .
- As you can see from �www.cdc.gov/nchs/about/otheract/hpdata2010/abouthp.htm, the initiative is driven with 28 different categories. All of these categories have grant award programs that are awarding monies through various agencies to promote a �healthy initiative program'. Some of the programs alone, sound harmless. When they are tied together though, they are disturbing.
- Former President Clinton's budget for his NATIONAL NANOTECHNOLOGY INITIATIVE is fueled by funding from the National Nanotechnology Initiative, National Science Foundation, National Institutes of Health, Department of Homeland Security, Department of Energy and the Department of Defense in combination with private and nonprofit funds from non-governmental organizations.
These funds now make available monies for grant projects for:
Focus Areas at a Glance (28)
- Access to Quality Health Services
- Arthritis, Osteoporosis and Chronic Back Conditions
- Cancer
- Chronic Kidney Disease
- Diabetes
- Disability and Secondary Conditions
- Educational and Community-Based Programs
- Environmental Health
- Family Planning
- Food Safety
- Health Communication
- Heart Disease and Stroke
- Immunizations and Infectious Diseases
- Nutrition and Overweight
- Injury and Violence Prevention
- Maternal, Infant, and Child Health
- Medical Product Safety
- Mental Health and Mental Disorders
- Occupational Safety and Health
- Oral Health
- Physical Activity and Fitness
- Public Health Infrastructure
- Respiratory Diseases
- Sexually Transmitted Diseases -STD
- Substance Abuse
- Tobacco Use
- Vision and Hearing
(more at link)
16
posted on
03/15/2006 9:42:46 AM PST
by
Calpernia
(Breederville.com)
To: Ramius
See my post #15. Use a sharpie if it'll help. ;)
17
posted on
03/15/2006 9:43:23 AM PST
by
AntiGuv
To: Calpernia
Sounds like a good thing that will help a lot of people.
As far as hacking in and killing someone... they could do that now by hacking into the pharmacy.
Just because something *can* be misused doesn't mean it shouldn't exist. Guns and cars and cameras and hair dye can all be misused. There's risk in all things.
18
posted on
03/15/2006 9:47:50 AM PST
by
Ramius
(Buy blades for war fighters: freeper.the-hobbit-hole.net --> 1100 knives and counting!)
To: AntiGuv
Sure you can, it's harder, you've got to get a hold of something of theirs with bar code (like an AZ driver's license) and hack the data, but it's doable. And you can't do any of that other stuff with RFIDs, maybe in the future but not now, right now RFIDs are for tracking PACKAGES and make shipping a lot easier. People don't have RFIDs, and given the short range of RFIDs most of the nightmare scenarios are technically unfeasable.
19
posted on
03/15/2006 9:48:39 AM PST
by
discostu
(a time when families gather together, don't talk, and watch football... good times)
To: Ramius; discostu
PS. And to be sure, I have no problem with RFID so long as it's limited to unrisky uses. It's many of the proposed uses, which incidentally would involve more memory than the amount supposedly inadequate for viruses, that are of concern to me.
20
posted on
03/15/2006 9:49:09 AM PST
by
AntiGuv
Navigation: use the links below to view more comments.
first 1-20, 21-40, 41-60, 61-80 ... 101 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson