From what I remember about the flipper device, it's incapable of reading the encrypted stream from a payment card. That's not to say it can't be done, Chip and Pin was defeated almost as soon as it came out and if you have the money, reading the payment information from a card can be done without effort.
The flipper device can, however, read unencrypted ID cards like the ones used everywhere for building access in what's called a replay attack - read the card, replay the signal to trip the reader. A close friend that works in a secured area found that it would replicate his badge without problem, allowing access to areas that could be extremely damaging to the company.
From what I remember about the flipper device, it's incapable of reading the encrypted stream from a payment card. That's not to say it can't be done, Chip and Pin was defeated almost as soon as it came out and if you have the money, reading the payment information from a card can be done without effort.
The flipper device can, however, read unencrypted ID cards like the ones used everywhere for building access in what's called a replay attack - read the card, replay the signal to trip the reader. A close friend that works in a secured area found that it would replicate his badge without problem, allowing access to areas that could be extremely damaging to the company.
(post is archived)