BenjaminJun added that all the devices his company has tested produced signals of some kind that could betray their keys, although different eavesdropping techniques were necessary for different devices. While some could be vulnerable to a long range attack, as in the iPod demonstration, others like the HTC devices would require an attacker to get up close. But that could be practical, said BenjaminJun, if contactless receivers used to collect payments from phones with NFC chips were modified by crooks. NFC chips are expected to become widely available in smart phones in coming months as Google and other companies develop contactless mobile payment systems. The apps used in BenjaminJun and Kenworthy's demonstrations were of their own design, because it would be "bad manners" to demonstrate sniffing keys from other company's apps, said BenjaminJun. However, the researchers have shown privately that they can eavesdrop on encryption keys from any app or mobile software, he said. Details of the vulnerabilities uncovered have been provided to handset manufacturers. "We've notified all the phone vendors and manufacturers, and there's a lot of work being done on this now," he said. "I can't name names, but I will say that we're working with one large tablet and smart-phone manufacturer." Modifications to the hardware/software of a mobile device can muddy the signals that an eavesdropper can pick up. Many wireless credit card readers already include such countermeasures, added BenjaminJun. In the case of smart phones and tablets, software upgrades that split operations using cryptographic keys into multiple parts that are then combined could protect existing devices without changes to hardware, said BenjaminJun. However, such tactics come at a cost. "They do require some kind of performance hit," added BenjaminJun, because they ask a chip to do more work. That also means more power consumption, which could deter some developers, who are loath to waste precious battery life.