Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is there any other ways to prevent this? I know there's latency checks, but I assume in some cases this attack could still work.


Buy a wallet with conducting mesh (Faraday cage) or make a sleeve for your card (e.g. from an aluminium can).

Quick failure test it: by seeing if card still works on terminal when protected.

Not perfect, but would prevent most "risks".


I've carried a Datasafe wallet made by Kena Kai for ten years or so. It includes a metallic mesh next to the leather that is durable enough that the wallet is still in good shape. I have no idea how well the protection truly works (it's marketed as complying with "FIPS-201 guidelines," which might not mean a lot) but it's been an excellent wallet in its own right.

There don't seem to be nearly as many of these for sale now as there were ten years ago, which is interesting.


Request a card without NFC.

If not possible drill through the antenna.


Many cards are programmed to stop working if their antenna is disconnected/broken. Not sure why, but I assume it's an anti-reverse-engineering thing. Or perhaps the antenna has another use like a power supply smoothing inductor.


Worth a try though.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: