PROBLEM: Your Credit Card Can Betray You
This website has been created to raise awareness and help people protect themselves from identity theft. Your credit cards, passports, IDs or driver’s license provide an easy access to your identity wirelessly to whoever has the right tool (which is not too difficult to obtain). This happens thanks to a technology called RFID (more details below).
SOLUTION: Arm Yourself With a CC Protector
CC Protector offers an easy solution! We strongly suggest that you keep your credit cards in our special alloy sleeves that block RFID signals at 13.56 MHz and protect a single credit card embedded with a wireless chip. It protects against identity theft, tracking and other unauthorized reads.
What Visa, MasterCard, American Express, Discover Don’t Want You To Know
What Is RFID?
[excerpts from a Wikipedia article about ]
Radio-frequency identification (RFID) is a technology that uses communication via electromagnetic waves to exchange data between a terminal and an object such as a product, animal, or person for the purpose of identification and tracking. Some tags can be read from several meters away and beyond the line of sight of the reader.
Radio-frequency identification involves interrogators (also known as readers), and tags (also known as labels).
The use of RFID technology has engendered considerable controversy and even product boycotts by consumer privacy advocates. Katherine Albrecht and Liz McIntyre, co-founders of CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering), are two prominent critics of the technology who refer to RFID tags as “spychips”. The two main privacy concerns regarding RFID are:
- Since the owner of an item will not necessarily be aware of the presence of an RFID tag and the tag can be read at a distance without the knowledge of the individual, it becomes possible to gather sensitive data about an individual without consent.
- If a tagged item is paid for by credit card or in conjunction with use of a loyalty card, then it would be possible to indirectly deduce the identity of the purchaser by reading the globally unique ID of that item (contained in the RFID tag). This is only true if the person doing the watching also had access to the loyalty card data and the credit card data, and the person with the equipment knows where you are going to be.
Most concerns revolve around the fact that RFID tags affixed to products remain functional even after the products have been purchased and taken home and thus can be used for surveillance and other purposes unrelated to their supply chain inventory functions.