.. note::
    This software can actually be used in a relay attack allowing full access
    to the card. We discussed the impact especially on the `Relay attack
    against the German ID card
    <http://media.ccc.de/browse/congress/2010/27c3-4297-de-die_gesamte_technik_ist_sicher.html>`_,
    but it generally concerns *all* contact-less smart cards.
