Skip to content

Category: IT

Data leak: The legacy of the historically grown charging infrastructure for electric cars – Why aren’t we getting away from it anytime soon?

I find publicly available RFID charging card UIDs and ask myself what the potential for abuse is. I clone my own charging card and, together with a journalist from Golem, ask fundamental questions about the security of European charging infrastructure and probably create a precedent for how to deal with a data leak in such a case.

Leave a Comment