Adding backdoors at the chip level — Schneier on Security — “In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level… we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques.”
- Luxury brand uses RFID tags and QR codes to link perfumes to digital twins
- Lloyds Bank adds NFC passport scanning to mobile banking app
- Indian food delivery service promotes online ordering with an NFC coaster
- Škoda adds support for contactless in-vehicle fuel payments in six European countries
- Nine in 10 payment ring users say it’s their favourite way to pay