
Use case
So what is the use case / attack vector that this would achieve?
I hacked this reader and made the person look like they are dead / alive?
All security needs to look at the risk and the mitigation/cost to secure and resolve. Not all things need securing and I feel this may be one of them. A poster above "or wait another five years (while people die) " has it spot on.