![](http://www.securingpharma.com/40/articles/1030.php?cmd=ShowAsset&assetID=2391&nosurround=true&fakeExtension=.jpg)
Why mention this on a security blog? Well, such fake stores sell equally fake hardware, which is indistinguishable from the real thing in appearance. Besides using inferior internal parts the clones can potentially contain pre-installed malicious software. That software puts user data at risk.
As always, we recommend strong authentication such as challenge-response and transaction data signing.