Hosted by Kenneth Emeka O. and Boris R.
We will survey various ways how RFID devices can be exploited by attackers.