They also provide more efficient functionality than traditional RFID chips ... from the NFC tag and relays it to the NFC reader in real time. Relay attacks involve two connected devices.
Some results have been hidden because they may be inaccessible to you