A look at the challenging requirement of anonymity in RFID systems. After a discussion on proposed solutions to the privacy threat you will see how easily such solutions can be circumvented or completely broken. By looking at the physical characteristics of the tags, Karsten will demonstrate how new attacks can circumvent these solutions, some of which have been implemented in a lab. There will then be a look at the back-end infrastructure of the RFID system which will show that the currently outlined implementation will compromise privacy in ways that have never been anticipated - basically allowing for customer tracking over the Internet by everyone.