Adding backdoors at the chip level — Schneier on Security — “In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level… we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques.”
- Bank of China lets taxi drivers accept central bank digital currency payments on NFC mobile phones
- Juniper forecasts 25% increase in POS terminal transaction values by 2028
- STMicroelectronics launches NFC tag chip with elliptic curve cryptography
- NFC Forum survey finds majority of consumers now prefer making payments with their mobile phone
- Hello, NFCW readers!