Feeds

Steel-woven wallet pledges to keep RFID credit cards safe

Blocks wireless snoopers

The Power of One Brief: Top reasons to choose HP BladeSystem

Worried someone may try to wirelessly nab your personal details from those RFID cards in your wallet? Get some peace of mind with the “identity theft preventing privacy wallet”, its seller claims.

We kid you not. According to its online retailer, the wallet is woven from over 20,000 super-fine strands of stainless steel which “protects your ID like armour plate”.

rfid_wallet

Stainless steel stitching protects cards from wireless data theft

The idea is sound, in principle. The stitching methodology reminded us of a Faraday cage – an enclosure designed to block out external electric fields.

The wallet promises to completely shield its contents from today’s hi-tech pickpockets, while also being stronger than leather.

Speaking of contents, the wallet can hold six cards, has two internal slots and a billfold – that’s a fiver folding flap to our British readers.

Two designs are available – “Smooth” and “Engine-Turned” - online now, each priced at $80 (£49/€55). ®

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
Report: American tech firms charge Britons a thumping nationality tax
Without representation, too. Time for a Boston (Lincs) Macbook Party?
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.