Core Viewpoint - The recent discussions on social media regarding NFC payment security highlight public concerns about potential unauthorized transactions, emphasizing that the real risks lie in information leakage and authorization processes rather than the NFC technology itself [1][4]. Group 1: Understanding NFC Technology - NFC, or Near Field Communication, operates at a frequency of 13.56 MHz and requires devices to be within 10 centimeters for effective communication, making it a short-range wireless communication technology [1]. - The NFC module in smartphones functions like a compact card reader and virtual card holder, supporting three modes: card emulation, reader mode, and peer-to-peer mode for efficient data exchange [2][3]. Group 2: Misconceptions About NFC and Fraud - NFC technology is often wrongfully labeled as a facilitator of fraud; however, experts clarify that it is merely a tool exploited by criminals who rely on sophisticated schemes to steal sensitive information [4]. - The fraud process typically involves two main steps: first, the theft of core information through deceptive tactics, and second, the remote binding and control of the victim's information to create a "virtual cloned card" [4]. Group 3: Safe Usage Practices for NFC - Users are advised to assess their NFC usage frequency; if used regularly, keeping it on may enhance convenience, while turning it off when not in use can eliminate potential risks [5]. - To safely use NFC, experts recommend three key practices: maintaining strict authorization protocols, setting up security barriers for payment applications, and being cautious of unfamiliar NFC interactions in crowded places [6][7].
隔空盗刷银行卡的黑锅,手机NFC不背
Xin Hua Wang·2026-01-12 23:38