{"id":29042,"date":"2026-02-25T10:58:44","date_gmt":"2026-02-25T18:58:44","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=29042"},"modified":"2026-02-09T11:06:23","modified_gmt":"2026-02-09T19:06:23","slug":"do-you-need-rfid-blocking-wallet","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/","title":{"rendered":"Can an RFID Blocking Wallet Keep Your Cards Safe? Facts vs. Hype"},"content":{"rendered":"\n<p>Most of us like to grumble at least occasionally about how complicated life has gotten. And it certainly has, in a lot of ways, but in others it\u2019s gotten a lot more convenient. Just a few decades ago, for example, buying things meant going to the bank \u2014 your own physical branch, mind you, during the brief hours it was open \u2014 to take out cash. If you didn\u2019t have time for that, or ran out of money, you\u2019d write a check and hope the merchant accepted it. The merchant, meanwhile, hoped your check was good.&nbsp;Now, paying is as simple as a quick tap with your phone or a card, and the transaction takes place instantly. It almost seems <em>too<\/em> easy. The NFC circuit in your phone, or the RFID chip on your card, gives the terminal your payment information, and boom, you\u2019re done! But can you trust that only the terminal can read that information? Or should you invest in an RFID blocking wallet (or something similar) for added protection? Let\u2019s dig into the technology and see if it\u2019s worth doing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does RFID Work?&nbsp;<\/h2>\n\n\n\n<p>There are several different kinds of Radio Frequency Identification (RFID) chips, but they all work on <a href=\"https:\/\/bluefletch.com\/rfid-technology-how-it-works-and-has-the-power-to-transform-the-supply-chain\/#:~:text=An%20RFID%20reader%20sends%20Radio,data%20from%20the%20embedded%20chip.\" target=\"_blank\" rel=\"noreferrer noopener\">the same basic principle<\/a>. There\u2019s a small chip with a bit of code on it that contains information. In commercial settings like a factory or an Amazon warehouse, that chip might identify a part or a specific package. On credit or debit cards, it holds your payment information. There\u2019s also an antenna attached to the chip.\u00a0<\/p>\n\n\n\n<p>When a chip reader comes close to the RFID tag, the reader\u2019s radio waves act as a power source for the chip and antenna, and it responds by transmitting the information it contains (radio waves are a power source in themselves, remember; it\u2019s how your microwave cooks things). Industrial RFID tags can be read from several feet away, but the kind on your cards need to be very close to the reader.&nbsp;<\/p>\n\n\n\n<p>The Near Field Communications (NFC) chips in your phone are essentially a souped-up form of RFID, which can transmit and receive (so it\u2019s both a tag and a tag reader). Like your cards, this only works in very close proximity to the payment terminal.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Can RFID Really be Hacked?&nbsp;<\/h2>\n\n\n\n<p>That leads to a couple of big questions: a) whether RFID cards can be hacked; and b) whether they\u2019re a safe way to pay.&nbsp;<\/p>\n\n\n\n<p>The first question was answered long ago with a definitive <em>yes<\/em>. All the way back in 2006, security researchers were demonstrating \u201cproof of concept\u201d attacks <a href=\"https:\/\/www.wired.com\/2006\/05\/rfid-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">harvesting the information from RFID cards<\/a>. But the second question is tougher, because most of these hacks targeted other RFID devices rather than debit and credit cards. The whole point of chip-enabled cards, after all, was to <a href=\"https:\/\/www.tdecu.org\/blog\/why-are-chip-cards-more-secure-than-swiping\" target=\"_blank\" rel=\"noreferrer noopener\">make them more secure<\/a> compared to the old-school magnetic stripe. The stripe was easily read by <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-spot-a-skimming-scam\/\" target=\"_blank\" rel=\"noreferrer noopener\">credit-card \u201cskimmers\u201d<\/a> \u2014 an illicit reader installed over the top of a legitimate one \u2014 which allowed criminals to make a duplicate of your card, and max out your credit in a hurry.\u00a0<\/p>\n\n\n\n<p>Chip cards are a tougher nut to crack, partly because key data on the chip is encrypted and partly because they use an algorithm that creates a unique code (an \u201cAuthentication Data Element,\u201d or ADe) for each purchase. Scammers using an improved version of a skimmer, called <a href=\"https:\/\/www.spokeo.com\/compass\/have-you-been-the-victim-of-a-shimming-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">a \u201cshimmer,\u201d<\/a> can actually read some data from the chip, but it\u2019s not as bad as it sounds at first.\u00a0<\/p>\n\n\n\n<p>Criminals <a href=\"https:\/\/krebsonsecurity.com\/2017\/01\/atm-shimmers-target-chip-based-cards\/\" target=\"_blank\" rel=\"noreferrer noopener\">still can\u2019t clone the chip card<\/a>, but they\u2019ll get the iCVV code \u2014 the digital equivalent of those three digits on the back of your card \u2014 which means they can make a better clone of your stipe card. Some card issuers have dropped the stripe entirely, using either tap-and-sign or tap-and-PIN instead, to close this vulnerability.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-liza-summer-6348118.jpg?resize=1024%2C682&#038;ssl=1\" alt=\"how RFID blocking wallets work\" class=\"wp-image-29044\" srcset=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-liza-summer-6348118.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-liza-summer-6348118.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-liza-summer-6348118.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-liza-summer-6348118.jpg?resize=1170%2C780&amp;ssl=1 1170w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-liza-summer-6348118.jpg?resize=585%2C390&amp;ssl=1 585w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-liza-summer-6348118.jpg?resize=263%2C175&amp;ssl=1 263w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-liza-summer-6348118.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How Does RFID Blocking Work?&nbsp;<\/h2>\n\n\n\n<p>A lot of companies (a <em>lot<\/em> of companies), seeing the coverage of RFID hacks and vulnerabilities over the years, have begun marketing protective devices to help keep your information secure. Essentially, they create what\u2019s called a \u201cFaraday cage\u201d around your card. A Faraday cage (named for a brilliant 19th-century pioneer in electrical research) is just <a href=\"https:\/\/nationalmaglab.org\/about-the-maglab\/around-the-lab\/what-is-that\/faraday-cage\/\" target=\"_blank\" rel=\"noreferrer noopener\">an enclosure made of conductive material<\/a>, like aluminum or copper. They\u2019re routinely used in scientific and industrial settings, where sensitive equipment needs to be protected from interference, and even in consumer electronics, where outside signals might mess with your data or your music.\u00a0<\/p>\n\n\n\n<p>Interestingly, a Faraday cage doesn\u2019t have to be a solid enclosure, because a conductive mesh works just as well. If you cut open a TV cable, you\u2019ll see a regular wire in the middle and a copper braid around the outside; the braid acts as a Faraday cage to shield the wire in the middle (which carries your TV signal) from interference.&nbsp;<\/p>\n\n\n\n<p>That\u2019s important for consumers wanting a wallet that can protect their cards from a potential hacker with an RFID reader. A solid Faraday cage wouldn\u2019t make a very practical wallet, but mesh can be incorporated into even a slender, flexible wallet without much difficulty. That\u2019s how RFID blocking wallets work.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Do I Need an RFID Blocking Wallet?&nbsp;<\/h2>\n\n\n\n<p>Here\u2019s the thing about RFID hacking: despite all the potential vulnerabilities that have been demonstrated over the years, it just hasn\u2019t been a \u201cthing\u201d in the real world. There are a couple of reasons for that. One is that relatively few cards are \u201ccontactless,\u201d meaning you could theoretically read them from a few inches away (subway, coffee shop, elevator) with an RFID reader. Most need to be inserted into the terminal, or make physical contact with the \u201cTap\u201d reader.&nbsp;<\/p>\n\n\n\n<p>A more important point is that, on the whole, it\u2019s just not worth criminals\u2019 time. Like any other business, they\u2019re concerned with efficiency and return on investment. For pennies, they can send out a <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\" target=\"_blank\" rel=\"noreferrer noopener\">mass phishing email<\/a> and potentially steal credit card data from thousands. Hackers can steal <a href=\"https:\/\/www.clearlypayments.com\/blog\/credit-card-fraud-in-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">millions of card users\u2019 data<\/a> in a single breach, and \u2014 more importantly \u2014 sell them on to other criminals for <a href=\"https:\/\/www.privacyaffairs.com\/dark-web-price-index-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">as little as $10 to $15 each<\/a>. A look at the FTC\u2019s <a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/CSN-Data-Book-2022.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">credit card fraud data for 2022<\/a> shows over 400,000 incidents involving new accounts (i.e., <a href=\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/\" target=\"_blank\" rel=\"noreferrer noopener\">identity theft<\/a>), compared to under 40,000 involving existing accounts (credit card hacks, skimming, <a href=\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/\" target=\"_blank\" rel=\"noreferrer noopener\">shoulder surfing<\/a>, and everything else combined).\u00a0<\/p>\n\n\n\n<p>In other words, criminals have collectively decided that \u201cthe juice isn\u2019t worth the squeeze.\u201d That\u2019s not to say a hack is impossible, especially if you\u2019re a public figure or in some other way a high-value target. It also doesn\u2019t mean things will necessarily stay this way (there\u2019s a lot of money and talent on the criminals\u2019 side, after all).<\/p>\n\n\n\n<p>So, do you <em>need<\/em> an RFID blocking wallet or sleeves for your cards? No, probably not. But if you\u2019d sleep better for having one, by all means go ahead and buy it.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-rann-vijay-677553-7742551.jpg?resize=1024%2C682&#038;ssl=1\" alt=\"\" class=\"wp-image-29045\" srcset=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-rann-vijay-677553-7742551.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-rann-vijay-677553-7742551.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-rann-vijay-677553-7742551.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-rann-vijay-677553-7742551.jpg?resize=1170%2C780&amp;ssl=1 1170w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-rann-vijay-677553-7742551.jpg?resize=585%2C390&amp;ssl=1 585w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-rann-vijay-677553-7742551.jpg?resize=263%2C175&amp;ssl=1 263w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-rann-vijay-677553-7742551.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">There are Some Special Cases<\/h2>\n\n\n\n<p>That\u2019s not to say there aren\u2019t a few scenarios where RFID is a legitimate threat; they\u2019re just not usually something a private citizen needs to be concerned about. Those passes you swipe to get into secured areas at work? Those are RFID tags, and they\u2019re much easier to duplicate than a credit or debit card. So are the card-shaped <a href=\"https:\/\/www.thesecurityblogger.com\/hackers-build-a-master-key-that-unlocks-millions-of-hotel-rooms-wednesday-april-25-2018-swati-khandelwal-hotel-lock-key-hacking-if-you-often-leave-your-valuable-and-expensive-stuff-like-laptop\/\" target=\"_blank\" rel=\"noreferrer noopener\">hotel room keys<\/a>.\u00a0<\/p>\n\n\n\n<p>While attacks like those are seldom targeted at an individual, as opposed to the organization, it\u2019s <em>possible<\/em> that someone with an RFID reader \u2014 like the <a href=\"https:\/\/flipperzero.one\/\" target=\"_blank\" rel=\"noreferrer noopener\">Flipper Zero<\/a>, marketed to hobbyists as a \u201cSwiss Army Knife for hacking,\u201d at well under $200 \u2014 could manage to copy the RFID for your specific room, and steal your personal belongings. It\u2019s a stretch, but it could happen. There\u2019s certainly no harm in using a sleeve or RFID blocking wallet to eliminate that minimal risk.\u00a0<\/p>\n\n\n\n<p>More often, this kind of thing is a headache for the companies involved, and the suppliers of the actual RFID cards and their readers (whose customers, of course, use them for security reasons and expect them to be, well\u2026 secure). If your workplace suddenly decrees that you need to keep your access card in an RFID-blocking sleeve or wallet when it\u2019s not in use, this is why.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Don\u2019t Worry, Be Happy<\/h2>\n\n\n\n<p>So what\u2019s the bottom line?&nbsp;<\/p>\n\n\n\n<p>If you\u2019ve been eyeing advertisements for RFID blocking wallets or contemplating a half-dozen sleeves to protect your cards individually, you can relax. There\u2019s little realistic likelihood that anybody\u2019s going to hack your cards that way. On the other hand, if the price fits your budget and it will make you feel better, there\u2019s no compelling reason not to.&nbsp;<\/p>\n\n\n\n<p>On the whole, though, you\u2019ll do more for your own security if you keep up to speed on the latest scams and threats through blogs like this one, and keep a close eye on your accounts for any unexpected or illicit activity.&nbsp;<\/p>\n\n\n\n<p>Better yet, sign up for <a href=\"https:\/\/www.spokeo.com\/identity-theft-protection\" target=\"_blank\" rel=\"noreferrer noopener\">Spokeo Protect<\/a> (our identity protection service) and let us do all the monitoring for you. That will address a whole lot of threats that are more immediate and dangerous than RFID hacking, and should do a lot more for your peace of mind than any wallet, however high-tech.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most of us like to grumble at least occasionally about how complicated life has gotten. And it certainly has, in a lot of ways, but in others it\u2019s gotten a&hellip;<\/p>\n","protected":false},"author":112,"featured_media":29043,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[612,614],"tags":[],"class_list":["post-29042","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Do you Really Need an RFID Blocking Wallet? Let\u2019s Find Out. | Spokeo<\/title>\n<meta name=\"description\" content=\"We know RFID technology like chips in credit and debit cards are vulnerable to hacks, but is it something you should be worried about?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do you Really Need an RFID Blocking Wallet? Let\u2019s Find Out. | Spokeo\" \/>\n<meta property=\"og:description\" content=\"We know RFID technology like chips in credit and debit cards are vulnerable to hacks, but is it something you should be worried about?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-25T18:58:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/\",\"name\":\"Do you Really Need an RFID Blocking Wallet? Let\u2019s Find Out. | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1\",\"datePublished\":\"2026-02-25T18:58:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"We know RFID technology like chips in credit and debit cards are vulnerable to hacks, but is it something you should be worried about?\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1\",\"width\":1280,\"height\":853,\"caption\":\"do you need an RFID blocking wallet?\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Do you Really Need an RFID Blocking Wallet? Let\u2019s Find Out. | Spokeo","description":"We know RFID technology like chips in credit and debit cards are vulnerable to hacks, but is it something you should be worried about?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/","og_locale":"en_US","og_type":"article","og_title":"Do you Really Need an RFID Blocking Wallet? Let\u2019s Find Out. | Spokeo","og_description":"We know RFID technology like chips in credit and debit cards are vulnerable to hacks, but is it something you should be worried about?","og_url":"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2026-02-25T18:58:44+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/","url":"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/","name":"Do you Really Need an RFID Blocking Wallet? Let\u2019s Find Out. | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1","datePublished":"2026-02-25T18:58:44+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"We know RFID technology like chips in credit and debit cards are vulnerable to hacks, but is it something you should be worried about?","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/do-you-need-rfid-blocking-wallet\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1","width":1280,"height":853,"caption":"do you need an RFID blocking wallet?"},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5926243.jpg?fit=1280%2C853&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-7yq","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/29042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=29042"}],"version-history":[{"count":2,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/29042\/revisions"}],"predecessor-version":[{"id":29047,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/29042\/revisions\/29047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/29043"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=29042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=29042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=29042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}