Can a Man in the Middle attack on NFC be prevented by programming when working with NFC?
I have done research on how to authenticate NFC tags. Seeing how you can use digital signatures, or a hidden key on newer NFC tags, it seems safe. However none of it would prevent a Man in the Middle attack where a device can… Continue reading Can a Man in the Middle attack on NFC be prevented by programming when working with NFC?