Talk:Wiegand interface

From Wikipedia, the free encyclopedia
Jump to: navigation, search

protocol publicly broken[edit]

A researcher named Zak demonstrated a PIC chip with some associated wiring (cost around $10) which implements a general man-in-the-middle attack against the Wiegand protocol used in commercial security card readers, such as those used in hotel rooms. It was demonstrated at Defcon in 2007 and reported in several journals, including PCWorld. This should be reflected in the article, but I lack time to do so. Perhaps someone else....