What is an ID chip
security RFID chips - a security risk?
RFID technology is guaranteed to get in your way here and there in everyday life. You probably even have the sparkling chips in your closet. We will show you the possible dangers and possible protective measures.
What is rfid
RFID stands for Radio-frequenc identification, so identification by radio waves. This is basically a very simple system made up of two components: a transponder and a reader. The transponder is usually called an RFID tag or radio tag. "Label" already indicates that it is a question of quite small devices and also the possible use is implied. In practice, for example, RFID tags are often small stickers with an edge length of less than one centimeter that are attached to goods. Or they are sewn into garments by the manufacturer. The main reason is quite trivial: you want to know, for example, whether a pair of pants that has been produced has left the factory or not. With a sewn-in RFID tag, trousers can simply be brought from the production hall to the dispatch department and a reader on the door records this process. And what works with a pair of pants is of course also possible with a whole container full of pants. It is precisely there in the logistics industry that there is the greatest interest in RFID technology. RFID has been a bigger topic for maybe 10 to 15 years, but the first applications were already in the 1940s!
However, RFID tags can also be significantly smaller and shrink to the size of a grain of rice and below. A well-known example from the tabloid media was its use in people a few years ago: in some scene clubs, regular customers could have RFID chips implanted under their skin to simplify entry and drinks purchases. And at this point, at the latest, the average consumer probably got queasy. The slightly paranoid techie can look forward to "RFID powder": The smallest RFID chips are just 0.02286 millimeters in size. Of course, horror scenarios are spreading. From planting such chips in human cells to "dusting" crowds with a type of RFID dust.
As always, a first step against any worries is to understand the technology. Most RFID tags, especially the small ones, are passive devices that consist of a little antenna and analog circuitry to respond and transmit, and digital circuitry to store information (such as an item number). They get power for operation from the readers or their radio signals. Usually they can only be written on once and then basically act exactly like a normal barcode, except that they are recorded by radio instead of a camera. The range is usually a few centimeters. A big advantage of such passive tags: They are cheap enough to even use them on cheap products.
However, RFID tags can also reach the size of a book, be writable several times, have an active energy supply and a range of kilometers. In this respect, RFID is basically a framework for general transceiver applications. In the case of large shipping containers, for example, RFID can ensure that containers are not lost and can be found at all. On the one hand, the labels could be enriched with GPS data, on the other hand, of course, the locations of the readers are known - and thus also the tagged containers or products at a certain point in time.
However, the small, passive tags from your jeans or the sausage pack in the supermarket are more relevant for everyday life.
The benefits for a supermarket or logistics in general should be clear: Goods with RFID tags can be tracked. Theft protection is also possible: Labels that can be rewritten can be rewritten accordingly at the checkout, while labels that can be written on easily can be physically destroyed. And as a matter of principle, for us as customers in the supermarket, the level could one day be reached where products are packed, left the store and the products are automatically scanned and billed without cash. But that should take some time. Or how about tagged screws? Your car loses a screw and the on-board computer knows immediately which screw needs to be replaced and where - not bad either. There are still dozens of useful application scenarios, such as access controls or key finders.
The danger for each individual is also obvious: You too can be tracked! With RFID tags in vehicle license plates and a corresponding landscape of reading devices, extremely precise movement profiles can be created. Radio tags in pants could - theoretically - still be tracked after the purchase. Imagine buying a pair of jeans with an RFID tag in a large department store that is actually / officially only intended for the manufacturer's logistics. But who can tell you that the whole department store is not equipped with reading devices and that you will be followed down to the last centimeter the next time you visit? The routes you cover in the sales area are extremely interesting information for dealers
The danger can also be understood in a much more general way: with RFID, almost everything can be tracked - with low costs, tiny components, minimal transmission power and, above all, completely inconspicuous. In addition, you simply never know exactly where such a label is being hyped to you, let alone what it does in detail. For example, there are also tags that do not encrypt information, but simply reveal it - that is even the basic idea!
The most prominent example of an RFID threat is probably the new identity card: The chip contained on it should be readable from a distance of around two meters. The information is of course encrypted. Nevertheless: Anyone can read the information first - if the encryption is cracked at some point, it looks bleak. By the way: contactless payment with EC or credit cards works with NFC technology, which is at least based on RFID. And if small amounts can be paid here without entering a PIN or the like, a thief can of course steal such amounts literally in passing. All he has to do is hold the counterpart close to your card.
You certainly do not have to panic at the moment, for technical reasons alone it is not possible, for example, to shower crowds with RFID dust and then track them individually. And the infrastructure of reading devices would first have to exist. In general, tracking scenarios are associated with considerable effort and hardly anyone is still storing sensitive information unencrypted on RFID tags. But who knows what the future will bring. There are three things you can do to protect yourself:
First you can buy wallets with appropriate protection for ID cards and other RFID cards: The weak, passive transmitters can be quickly disarmed with a little metal. For a few euros you can also get jammers in card format that protect an entire wallet
Secondly you can simply pay attention: if you notice tags on goods, remove or destroy them. Most of the time you will recognize the helical antenna somewhere and it is sufficient to cut it through at one point.
Third you can - this is really only recommended as a hobby or in case of slight paranoia - build your own jamming devices or destroy existing chips. RFID readers have a problem with processing a large number of tags at the same time. So if you put a few hundred tags in an MP3 player case, for example, it will confuse readers to the point of uselessness. Or a short cure in the microwave: This has the potential to destroy the tags themselves. It may be worth trying with a sock, but with a customer card with RFID you could lose the entire card ...
- How is Ellen DeGeneres personally
- Christians believe in one God
- How is a scented candle made
- It gets easier 1
- How ineffective was the Soviet economy
- Why are girly things looked down
- Should I invest in PPF or ELSS?
- Is bread butter healthy for exercise
- Who are the Rockefellers
- What is the race of the best looking women?
- How broken is our Fiat currency system
- What are some bad HR practices
- Stairlifts are successful in India
- Why don't people love Recep Tayyip Erdogan
- In which country there is always night
- How do I keep my father busy
- Which is something you will never get
- How prestigious is UC Berkeley
- What should you not eat for breakfast?
- What is VAT What are its advantages
- Do online code plagiarism checkers actually work?
- Belgium becomes Islamic
- What documents are required for the brand
- Should religion be considered existent
- Which companies pay the lowest tax?
- What makes a programmer adjustable
- Can sociopaths have empathy? Why?
- What is the easiest route to success
- How popular is cricket in the world
- What were Gaijin during Imperial Japan
- What are the types of sapphire diamonds
- What do teenagers want their parents to know?
- Is information systems a business degree
- Can a resource-based economy really work?