Talk:HID Global

From Wikipedia, the free encyclopedia

More information WikiProject Companies To-do: ...
Close

Hacked info

The following was pasted into the page. It could be good info, but needs cleanup and citation. HID uses their own iClass encryption, none open source based, that was cracked back to 2010. The company uses a raimbow table allowing them to find back any iClass readers encryption keys but still pretending to manufacture secured iClass readers with unique encryption key for each client. 2005 the HID proximity 125kHz readers and fobs were official cracked and tutorials came out on the internet. HID still produce, sell and promote their HID proximity readers without letting the public know know about the insecurity of the system, million people buy and install the proximity readers every years. Me eriac, Milosch (29 December 20, reversed engineering the HID iClass readers and publish on his website the methods and details. HID still procude today such unsecured readers, using heavy marketing HID still the leader on the security market.0). nstall the proximity 125kHz every year. ly Security through obscurity in opposition with the [[Kerckhoffs' principle|Kerckhoffs' doctrine]].

--209.34.31.15 (talk) 15:35, 6 September 2017 (UTC)


COI Disclosure and Request for Minor Cleanup Edits

Hello, I would like to disclose that I am an employee of HID Global. I am contributing in a personal capacity to request neutral, factual, and tone‑cleanup edits that comply with Wikipedia’s COI and NPOV guidelines. I have not added promotional content—only neutralized existing language, removed flagged buzzwords, and made minor editorial adjustments. Because of the COI guideline, I am requesting that an uninvolved editor review and implement the following minor edits.

Below are the proposed changes, grouped by section. All content is already present in the article; I have only updated tone and clarity and added proper citations where required.

---

Summary of Requested Minor Edits

Related Articles

Wikiwand AI