- From: Zoltan Kis via GitHub <sysbot+gh@w3.org>
- Date: Mon, 05 Jun 2017 14:26:53 +0000
- To: public-web-nfc@w3.org
> Would it be possible describing a MitM attack? It is possible to sniff NFC reads from up to 30 meters. Then it's a race condition. Also (read on below)... > Replay is thwarted at the application level using one-time challenges that are invalidated after being used. The tags will still contain the same info, since we can't update the tags. Read it once, and you're as good as the tag itself, and on the copies of the tag you can change the info associated with the origin. -- GitHub Notification of comment by zolkis Please view or discuss this issue at https://github.com/w3c/web-nfc/issues/128#issuecomment-306201355 using your GitHub account
Received on Monday, 5 June 2017 14:26:59 UTC