mitch at niftyegg.com
Fri Jan 30 00:09:03 EST 2015
On Thu, Jan 29, 2015 at 2:47 PM, Jim Windle <jim.windle at gmail.com> wrote:
> From "Science"'s "The End of Privacy" special issue. Using a small number
> of variables to de-anonymize credit card data.
Yes and it is also possible to take note of passive RFID tags inserted by
makers to control inventory. Most stores have readers at the doors
to control inventory. Some systems get disabled by a power burst at
the register but many are simply an inventory deletion that tags the
garment, belt, purses, shoes as not-our inventory (i.e. sold or some other
So purchase an item, have the inventory state changed to sold at
then that RFID can forever be matched to that transaction. Next exit the
and all N tags on you person are possibly logged with the sold item.
Next visit, simply entering the shop wakes up a correlation lookup of
the tag set. Some new some old... and the notion of you is less ambiguous.
Could be used at any bank or easy to rob store to ID thieves in addition to
video. Active scanners could trigger based on a surveillance warrant or
little difference than a wanted poster at one level, invasive at other
T o m M i t c h e l l
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the cryptography