How to Cheat at Deploying and Securing RFID