RFID: Password cracking made easy
"A normal cell phone contains all the components needed to compromise all RFID tags in the immediate vicinity," explained Shamir. He did not examine all types of transponders, but only those of the most widespread brand, and they are completely unprotected. However, he attributes the vulnerabilities found less to this specific, unnamed manufacturer than to the need to reduce the production costs of RFID transponders at all costs. This forced developers to throw all security requirements overboard.