Re: Some more background on the RFID experiment in Hiroshima

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This brings us to the question of the identifiers: it's certainly
true that systems which are anonymous but linkable offer a higher
level of privacy than those which do not. However, it's often
possible to determine which identifier a given person has (e.g., by observing a specific persons card being read), then
you can of course track them by name. In addition, if the
identifier->person mapping isn't generated securely and kept
confidential, then you may be able to quickly determine a
large fraction of the mapping.

Just to amplify this, it would be really trivial to gain targeted knowledge of the database just getting close to people that you're interested in tracking (e.g., talking to them, maybe even walking past them). I'm guessing that if you're engaging in industrial espionage, you should at least have some knowledge of who you would like to target. Once you've established the number-to-identity mapping, your sensors can do all the rest.

--Richard
_______________________________________________

Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]