My understanding is this, could be wrong
Anything LF such as work access badges are vulnerable to being sniffed
Hf stuff using only uid can Be sniffed
hf stuff using basic keys like mifare classic CAN be sniffed but it takes significantly more time since it has to try to brute force some stuff
Newer stuff using proper keys such as desfire is pretty much unbroken at this time
Usually I see these companies play it off that people are sniffing credit cards, which has a kernel of truth to it
The original version of wireless tap to pay like 10-15 years ago, was done quite poorly and not explained to customers… it was essentially the magnetic tape info… all your credit card number and stuff… completely in the blind… so it would just fart out your credit card info at a reader…. Very insecure and could be sniffed
That system was taken offline very quickly
The new stuff, using the little EMV chip on the card, works using good cryptography, so that the chip and the reader talk to each other in a way that even if somebody listens to all of the traffic, no actual data is exposed
The nfc tap to pay uses this system just wirelessly
So it’s secure
It’s part of the reason we can’t copy credit cards to implants, but instead have to build implants out of existing cards at the moment since they can’t be broken
All that being said, I think the flipper zero used to be able to pull surface level details from a tap to pay card, such as card number and expiration date…
I’m not sure how or why that is, wether it technically makes you vulnerable, but it kinda seems bad