Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Why the Mythbusters won't do RFID (2008) (youtube.com)
188 points by moe on July 22, 2010 | hide | past | favorite | 60 comments


Actually Adam did a hasty follow-up to this when the video came out to say something to the effect of 'Hmmm, I may have embellished the story - and um that didn't happen' (BTW, thats me doing some heavy me para-phrasing, not a quote)

Here's the link:

http://news.cnet.com/8301-13772_3-10031601-52.html

September 3, 2008 10:59 AM PDT

'MythBusters' co-host backpedals on RFID kerfuffle


I don't think anyone buys that follow-up: the original story sound very authentic and is told in a frank Adam-Savage-like manner. The follow-up: not so much. Of course, this is my characterization of my perception of the stories and may be influenced by, for instance, a predisposition towards believing the first story.


Adam Curry argued convincingly that the hasty follow-up was b.s.


Wonderful. Which account do we believe now?


This was discussed on No Agenda recently as an example of why corporate advertising is bad for media that does this kind of work (although Mythbusters rarely broaches subjects that run against corporate culture).

It seems odd Adam would have made up his original account, but only he knows the real story at this point.



I don't really understand the problem to be honest. Maybe someone can explain it to me.

Sure it's mildly inconvenient if your CC number gets stolen. But the CC company is the one that foots the bill. In that sense, they are the ones with the best incentive to keep the number secure. If fraudulent transactions instigated by RFID-scanning thieves ever gets to the point where it is a serious concern, I am certain that the companies will act in their own best interest to curb the behavior. In the mean time, who cares if they lose some money?


If they can convince the judges that the cards cannot be skimmed, than the very existence of a record of a transaction with a skimmed RFID is legal proof that you did in fact authorize that transaction with your authentic card. There is absolutely no risk for the card issuer involved.

It is like it was with debit card PINs here in germany, the banks convinced the judges that the cards are absolutely secure so that any fraud was in fact to blame on the card holder who either didn't protect his PIN or was actively trying to defraud the bank.


[citation needed] (out of personal interest)


Here is a citation (in german legalese, sorry for that): http://www.jurpc.de/rechtspr/20000026.htm


Even though I am German, thanks for the warning ;)


There is a "time wasted dealing with my credit card beign stolen" bit that most folks don't attach too much value to until it happens.


We believe the one he told to a bunch of geeks off the cuff and before the Producers and Legal team for his show told him to back away from what he said in this video.


This is just begging for a little unaffiliated team to do a professional investigation along with a good amateur video producer.


...and decent legal counsel.


No need. If it were published research, they'd be in the clear.


What if they're outside North America or Western Europe? Some place with weaker laws?


Personally I would call weaker the laws that don't allow you to produce a video like this.


or an offshore proxy


Or a bunch of ski masks.


Well Adam has stated in at least one interview that he reads Hacker News regularly so maybe we'll have a nice anonymous reply :)


I was curious about the validity of your statement so I did a little digging. It's true, he even mentions that he reads it on a daily basis.

Source: http://www.youtube.com/watch?v=J8jqea8R-bE

[edit] if you don't want to watch the whole 3 part video: http://www.youtube.com/watch?v=fFcVaFhKd_4#t=08m32s


You could use (also on HN front page) http://speakertext.com for linking to that. Just thought it was a neat instance!


I'm the founder of a company that sells RFID blocking wallets and passport cases http://www.difrwear.com. I met with Adam briefly back in 2008 at HOPE when he gave this talk and gave him one of our wallets.

I ended up quite dissaponited they couldn't air the show. Would have brought a lot of awareness to the issue. It is really easy to copy RFID credit cards... all you need to do is go buy a point of sale terminal from eBay, poke the little speaker that beeps when it reads a card with a needle and then plug it into a laptop and you've got a skimmer.....


I totally want to buy one of your wallets but you are currently out of stock on everything except the garish pink ones..


Can someone that knows about this stuff explain exactly what it is the CC companies don't want us to know?


I'm guessing it's:

a) RFID is readable from further away than they'd like you to think.

b) You don't know when your RFID card is being read.

c) Points a and b make tracking you really easy... for anyone to do.

d) The only thing that should (ideally) be stored on any RFID chip is a unique number... not any history (recent transactions), personal data (name/phone/picture), or payment system (think public transport) where the actual info about how much money is on the card is stored on the card itself... but that's exactly the type of information which is stored on these cards.

e) Nearly all encryption mechanisms are shoddy, either because they're poorly implemented open standards, or developed in-house by the vendor (security through obscurity). Cards that make use of real encryption would be (are?) expensive to make.

Here in the Netherlands the entire public transit system is being switched to an RFID-based system, and even to a non-security expert (me) it's clear that the system is based on an insecure premise (d), and would be very vulnerable to unknown scanning by someone wishing to track you from a decent distance (a-b-c).

I was interested in the security of this system, and found this video (http://events.ccc.de/congress/2007/Fahrplan/events/2378.en.h...) of some hackers who did an amazing job tearing it to shreds. They're pretty adiment that nobody is doing adequate encryption on RFID cards. If you're interested in this at all it's an amazing hack, involving dissolving the cards layer by layer to see the code.


a) it's a radio signal. However low power it is, it gets transmitted huge distances while still being detectable (especially if you capture it multiple times to read through noise). I'd love to take a massive dish (say, 20 foot diameter) & see how many can be captured from inside a neighboring building.

b) I have yet to hear of a single RFID card which has a switch on it to address this. It's a big security problem. I saw one hobbyist hook up an OLED pixel, but that's it.

e) I've heard of a couple, very expensive, challenge-response and public-key RFID systems. That is acceptable for authentication, but I've never heard of them actually being used, and one or two were only proofs-of-concept, IIRC. Many (I'd say easily most in use, from what I gather) simply transmit a unique ID, that never changes, which is used to perform X, which is ridiculously insecure.


  > I'd love to take a massive dish (say, 20 foot
  > diameter) & see how many can be captured from
  > inside a neighboring building.
Are you talking about active or passive RFID? I was under the impression that most RFID in use is passive. In that case, you'd have to transmit something to get a response, unless you're talking about camping out in an area where lots of cards are going be activated by various things other than yourself (e.g. entrance to the transit system). But even then the transmitting power of the RFID chip is proportional (?) to the power used to activate it, so something that only expects to read it from 2 feet away isn't going to blast it with enough power to be reliably read from 100 feet away, unless I'm misunderstanding how people do those long distance RFID reading records...


So say a 5-foot range. Find a group of employees out for lunch together and I walk past the table with a backpack on. Hardly suspicious, and I've probably got most of their building access cards.


I was responding to someone to someone talking about a 20-foot dish though. That's not something you stuff in a backpack. I was commenting on his desire to listen with a huge dish at a distance.


I vaguely remember an article from around the time RFID passports were a hot issue, in which researchers used multiple capturing devices and were able to square the reading distance. I don't know whether that was specific to the distance they used, the type of RFID, or even an upper limit, but it was an unbelievable improvement.


Most applications of RFID by authentication (think door locks) use only unique ID (address) of the card and nothing else. And the communication protocol used by reader works like this: Is there anyone with address starting with 0? ... Starting with 1? Yes. Starting with 10? ... Starting with 11? Yes. ..... So you only have to listen to reader side of communication and guess the last bit.


Passively camping out. Lots of (questionable) RFID uses I've seen are to unlock doors, often external ones. And if it's in a business park, it could easily be closer to 50 feet or less between buildings.


When I first heard of this attack I'm pretty sure the solution to that is a high-gain antenna. I don't know how often that actually works, but it's theoretically supposed to.


I'd love to take a massive dish (say, 20 foot diameter) & see how many can be captured from inside a neighboring building.

For active RFID, maybe you'd grab quite a bit.

You'd also grab quite a bit of noise. These are very low power signals; restricted by regulations in at least Australia, N.America, but it could still work. It did on 2005: http://blog.makezine.com/archive/2005/07/_defcon_rfid_world_...


An important note on the 69-foot record in 2005 you linked: they've just got two antennas, no focusing dish at all.

If someone comes along with a powerful rig, say using some of the techniques astronomers have had for many years to detect far weaker signals, what sort of distance might we be talking? It's not too far-fetched if you include possible corporate / governmental espionage attempts.


Imagine how many you could collect on your way to and from work each day in heavy traffic?


> d) The only thing that should (ideally) be stored on any RFID chip is a unique number

I disagree. This is basically where RFID has its benefits. Transport for London has the Oyster card, which I'm pretty sure is "electronic cash", i.e. your balance is stored on the card. This allows the system to work without the huge point of failure that is a central database and the connections to it. They have millions of people passing though thousands of checkpoints, many of them on moving busses. The infrastructure needed to make sure that every single one of these checkpoints can at any given time instantly run a transaction on the central database vs. having autonomous readers that just needs to upload their log every once in a while is huge.

It's basically the difference between mainframes/dumb terminals and P2P.

The problem is that RFID implementers have been cheap with the security on those chips. It's pretty simple to make a secure setup (famous last words....) tried and true ideas from cryptography (public key infrastructure etc..) but these call for more expensive chips, and when the choice is between expensive crypto that works and cheap security-through-obscurity that works until a grad-student is bored for the summer, you're going to go with the latter, of course.


Transport for London has the Oyster card, which I'm pretty sure is "electronic cash", i.e. your balance is stored on the card.

I wonder why people rolling out such systems never seem to see the obvious(?) writing on the wall:

1. Someone comes up with an "infinite balance"-hack.

2. Infinite balance cards are sold on a growing scale.

3. Transport company is forced to apply expensive bandaids to contain the problem.

Moreover I don't understand why they don't simply leverage the device that everyone already has in their pocket - the cellphone. The infrastructure would likely cost an order of magnitude less (barcode scanners like in airports, or bluetooth) and more importantly the system would be rather easy to make cryptographically secure because it's all in software.

"But what if I forgot my cellphone at home" - well, same thing if you forgot your RFID card at home.


> I wonder why people rolling out such systems never seem to see the obvious(?) writing on the wall:

The writing isn't at all obvious, otherwise they wouldn't have come up with it. I guess they've come to the conclusion that forging Oyster cash is similar to forging paper ticket or real cash. I don't know exactly how the Oyster card is implemented, but if it has some level of transaction log trail (however asynchronous), it's possible to detect forgeries (if you've only ever deposited £20, but since spend £100, you're cheating).

> Moreover I don't understand why they don't simply leverage the device that everyone already has in their pocket - the cellphone.

Scanning a barcode on a cellphone screen has three problems:

1: There are still loads and loads of cellphones not reliably capable of displaying a scannable barcode.

2: Barcodes are 100% copyable and include 0 cryptography - they have the same security as a barcode printed on a piece of paper, which, incidentally, is what they replace in airports.

3: A barcodes is read-only and requires online access to verify and record the transaction which is not feasible on the scale required for TfL.

Bluetooth has similar problems:

1: While most phones might be BT equipped, developing and supporting software for enough different phonemodels is very complex.

2: BT is designed for communication between specific devices, not a "class" of trusted devices. You can't trust all TfL checkpoints under one, so you'd have to navigate some sort of interaction every time you check in and out of a station/bus. Also, this interaction is different for each phone type = support hell.

3: BT is long range, compared to an RFID card. Sure, an RFID card might be skimmed from a difference, but it's easy for a reader to tell the card directly on the reader from every other card in the room. No so much for BT.

The solution including cellphones we need is NFC, which is basically RFID that can leverage the processing power of the cellphone. It just doesn't exist on very many phones yet.


Barcodes are 100% copyable and include 0 cryptography

That doesn't have to be case, which imho invalidates the rest of your points.

It's perfectly doable to issue tamper-proof tickets in the form of cryptographic signatures. So you could, for example, on a website order a barcode that encodes "This ticket valid between 10:00-18:00, on route section X, and belongs to Mr. John Doe". Obviously someone could copy and re-use that very barcode but you have the same problem with RFID tokens, unless there's some sort of centralized validation going on. Which is, btw, actually much easier to implement than you make it out to be, considering you'll have a hard time finding a train-station without GSM coverage nowadays.

I do agree with your concerns that not everyone has a phone capable of displaying these codes, yet, but it's a matter of years until that will be the case. During then you'll need the old paper tickets as a fallback - but that's the case with any new technology, it's not like you could flip the switch with RFID over night either.

Likewise Bluetooth may indeed be the wrong tool for the job, personally I'd favor the barcodes that seem to work out well enough on airports.

And finally, the development effort for making the software work all phone platforms is negligible. Again, the Airlines have demonstrated it can be done, and when you compare it to the effort required to rollout an RFID solution including the hardware then I'd bet the barcode approach is actually easier to do.

So. This, for once, is a problem that would be fairly straightforward to solve with technology. I can't help but assume this massive gravity towards more expensive and inferior solutions is mostly a result of lobbying. Obviously there's much more money to be made by handing out physical tokens and then enjoying the benefits of a ridiculously expensive support contract as you pile bandaid over bandaid...


Fair enough, I misunderstood how you imagined barcodes to be implemented, and yes, that invalidates my specific arguments.

I do, however, not agree that it's a superior solution to Oyster cards. First, the Oyster card was introduced in 2003 when even fewer cellphones would have been capable of displaying these barcodes - even then, the Oyster card was immediately available to everybody. That is a major feature - and it's not a small thing that even today all cellphones can't effortlessly do this. Fast mass adoption is a feature.

Also, no matter how easy the implementation, buying a barcode-ticket on your phone and then scanning it is more complicated than simply touching a card. If you have to run to catch a train, you don't want to have to stop and fiddle with your phone, for however short time, to get it to show the relevant barcode.

But that's dwelling over tiny details. My post was a counter-point to your claim that the Oyster card has grave and obvious flaws and was deployed in favour of an obviously better solution. I argue that, even considering that the Oyster card system have problems, those have not been exploited, while enabling the benefits of a pay-as-you-go system.

And just to be clear: I fully expect the Oyster system to be replaced by a system based on NFC once that is viable. That just wasn't in 2003, and it isn't today.


Hmm yea, you do have a point.

I admit I got a bit carried away on the barcode idea, mostly because I have used it at the airport and liked it. But I have to agree it might not scale as well to public transport use - the whole running after train thing.

Well, I guess we can meet in the middle and agree that NFC would be the near-optimal solution, when and if implemented securely (however unlikely that is.. ;-) ).


As far as I can tell, one large benefit for Oyster cards is that people can use the gates at tube stations faster than with paper tickets. This is quite impressive, given that an experienced commuter barely has to break stride to use a paper ticket. (And on buses, you don't have the delay of interacting with the bus driver - you beep on as you go past). I'm sure the cost savings for London Underground from increased speed beats that that they'll lose to forged Oyster cards.


but if it has some level of transaction log trail (however asynchronous)

"All transactions are settled between the card and reader alone. Readers transmit the transactions to the back office in batches but there is no need for this to be done in real time." - http://en.wikipedia.org/wiki/Oyster_card

People here are saying "I think/guess/assume that oyster cards work like... ". Without even checking with Wikipedia. I'd like to hear about the Oyster card system's strengths and weaknesses from someone who really knows the system.


This already has happened in Boston.

http://joshuamcginnis.com/2008/08/09/wow-how-to-hack-boston-...

It's really shocking that people think storing MONEY on a card that everyone has read/write access to is a GOOD idea.


They don't want you to know that the microchips in their cards can be reprogrammed so that you can wave it at reader and emulate somebody else's CC#, or that you can program any compliant RFID chip to communicate with those wavey card readers to the same effect, or that you can plant an RFID reader on an ATM or similar point and "skim" CC info without needing the user to explicitly swipe their card.

That's just a few off the top of my head...


You thought credit-card skimming was bad when the skimmer had to be physically attached to the ATM? http://krebsonsecurity.com/2010/01/would-you-have-spotted-th... Now imagine trying to find something that concealable anywhere in a 5 or 10-foot radius of the ATM itself. Hiding the card inside a metal wallet won't help you there.


Some credit cards use RFID technology to transmit unencrypted data to merchants. I believe PayPass uses RFID tech. Anyone with an RFID scanner can grab your CC info.


I wrote an article about the security of passive RFID tags at school about a year ago: http://kimjoar.net/security-passive-rfid-tags.html. There you might find some interesting stuff regarding your question. RFID is very cool, but there are still a lot of (unsolved) security problems with them, especially the passive tags.


That their cards may be as insecure as others have proven to be?

E.g., http://www.schneier.com/blog/archives/2008/03/london_tube_sm...


Johns Hopkins University researchers did a video where they got the RFID code from one of those gasoline auto-passes that you put on your keychain. It was a video where they sit next to someone with the RFID pass in their pocket, scan it with their laptop and then use the code at a gas station. I am at work and the link it blocked, but I do believe this here is the video and information. http://rfidanalysis.org/


The link is now squatted but still available in archive.org :

http://web.archive.org/web/20061109232923/http://www.rfidana...


Thankfully with a community named 'HackerNews' hopefully somebody here will be inspired to look into it deeper and see if they can do the show that networks can't do.

What's required to figure out how to hack these chips which are clearly readily available?


This is actually an active research area so a google scholar search can turn up interesting stuff from various security conferences. Here's a summary of what I've read and heard about:

If a chip has unecrypted personal data stored on it an attacker can easily gain access to it by stealing the device. If encryption is used throughout the chip then side channel attacks can usually break the encryption. This requires something like an oscilloscope, some resistors, and a soldering iron. The danger of this attack to a consumer depends upon what's stored on the RFID chip since the consumer will notice if someone has stolen their device and will have it disabled in short order.

To clone a tag that doesn't use encryption, for instance a tag that just sends an ID, you'd need a reader to query the tags and some device to copy the responses. This is probably the easiest attack but the reader, which needs to transmit a strong radio pulse and then listen for a response, either needs to be very large or in very close proximity and you could protect a card in your wallet by surrounding it in a metal mesh (which forms a faraday cage) so it's not clear how dangerous this could be in the wild.

If the communcation channel is encrypted then an attacker could listen to the query and response from a legitimate reader and RFID tag and could then replicate the legitimate response later. However, if there is any timestamp or counter involved this won't work.


Primarily about sniping bluetooth, but some basic discussion on reading RFID tags at a distance in the comments on this thread: http://www.schneier.com/blog/archives/2005/04/bluetooth_snip...


Let HN users create our own RFID MythBusters?


Ok, so how hackable/trackable is RFID?


Site is 404-ing currently...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: