Talk:HID Global

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Hacked info[edit]

The following was pasted into the page. It could be good info, but needs cleanup and citation. HID uses their own iClass encryption, none open source based, that was cracked back to 2010. The company uses a raimbow table allowing them to find back any iClass readers encryption keys but still pretending to manufacture secured iClass readers with unique encryption key for each client. 2005 the HID proximity 125kHz readers and fobs were official cracked and tutorials came out on the internet. HID still produce, sell and promote their HID proximity readers without letting the public know know about the insecurity of the system, million people buy and install the proximity readers every years. Me eriac, Milosch (29 December 20, reversed engineering the HID iClass readers and publish on his website the methods and details. HID still procude today such unsecured readers, using heavy marketing HID still the leader on the security market.0). nstall the proximity 125kHz every year. ly Security through obscurity in opposition with the [[Kerckhoffs' principle|Kerckhoffs' doctrine]].

--209.34.31.15 (talk) 15:35, 6 September 2017 (UTC)[reply]