WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

382

(post is archived)

[–] 4 pts

That does it. It’s time to get a Faraday bag for my payment cards.

Alarm bells went off in my mind the first time I was paying for something and I was told to simply tap my card on their card reader (no PIN entry required). That meant my payment cards were now targets for common criminals. Now someone standing near me might be able to replicate their signal to make fraudulent payments.

This device tries to prevent illegal behaviour out of the box, but you can change the firmware. It makes it easier for people to do those things.

[–] 3 pts

From what I remember about the flipper device, it's incapable of reading the encrypted stream from a payment card. That's not to say it can't be done, Chip and Pin was defeated almost as soon as it came out and if you have the money, reading the payment information from a card can be done without effort.

The flipper device can, however, read unencrypted ID cards like the ones used everywhere for building access in what's called a replay attack - read the card, replay the signal to trip the reader. A close friend that works in a secured area found that it would replicate his badge without problem, allowing access to areas that could be extremely damaging to the company.

[–] 2 pts

It's always interesting to me to see all these wireless signals people make throughout each day from their fitness dongles, smart watch and phone, tire pressure monitoring sensors, credit cards and more.

It can tell an interesting story if somebody collects those in a specific geographic area over time.

Tools like this flipper zero help more people discover them. Like the RTLSDR, HackRf, Ubertooth and others have previously.

[–] 2 pts

The cia, and even other government departments are aware of this, and takebcountermeasures. Imagine knowing the Bluetooth mac address lists of who congregated where, or who arrives when.

[–] 1 pt (edited )

Honestly your TPMS sensors are fine. It's a weak signal that only transmits a blip every few minutes at max. Unless a massive depressurization occurs. It's designed to only reach the antenna which is within a foot away. The battery lasts nearly a decade-ish, AKA weak signal.

[–] 0 pt

Modern tires have tags that transmit info that can be used to track your movements in your car, which is pretty shit. I'd like to see whats on them in order to figure out how to mitigate it but I don't have much other use for this thing personally.

[–] 0 pt

I wish there was a good way to wipe out the RFID tags in modern car tires, but after searching I haven't found one.

[–] 2 pts

Souks like to know more.about authors statement that he learned his "iPhone blasts [his] face with infrared signals every few second"

[–] 2 pts

Most don't know how face ID works. It's constantly looking for a matched object.

[–] 0 pt

and if its dark uses infrared to get a accurate id

[–] 0 pt

Wonder if it still does that unlocked.

[–] 1 pt

Applications can use Face ID as their unlocker as well, I suspect "yes."