EPC Global Gen2 v2.0 Vulnerabilties
Are there any vulnerabilities found in EPC Global Gen2 v2.0 of passive RFID tags? I am writing a research paper. any info regarding this will be very helpful.
Collaborate Disseminate
Are there any vulnerabilities found in EPC Global Gen2 v2.0 of passive RFID tags? I am writing a research paper. any info regarding this will be very helpful.
Is biometric data (photo, fingerprints etc). on new EU passports stored somewhere centrally?
Continue reading Central storage of passport biometric data? [on hold]
This question already has an answer here:
Is it possible for a NFC-enabled device to emulate a Visa card with PayWave?
1 answer
… Continue reading Cloning Contactless Credit Cards [duplicate]
Assuming you have a child and it’s no longer womb-bound, there’s a fairly high chance they’ve already had some experience with the glowing beauty that is the LCD display; babies of only a few months old are often given a tablet or smartphone to keep them occupied. But as the child gets to the age where they are capable of going outside or doing something more constructive, staring slack-jawed and wide-eyed at their tablet becomes a concern for many parents.
[Richard Garsthagen] is one such parent. He wanted a way to monitor and control how much time his children were …read more
I have connected an RFID reader to an arduino.
I have checked the connections are correct and the indicator on RFID is glowing and the code:
(dumpinfo)
from the library of rfid(MFRC522) has been uploaded to the arduino bu… Continue reading I am unable to get rfid card scanned by rfid reader
Biohacking is the new frontier. In just a few years, millions of people will have implanted RFID chips under the skin between their thumb and index finger. Already, thousands of people in Sweden have chipped themselves to make their daily lives easier. With a tiny electronic implant, Swedish rail passengers can pay their train ticket, and it goes without saying how convenient opening an RFID lock is without having to pull out your wallet.
That said, embedding RFID chips under the skin has been around for decades; my thirteen-year-old cat has had a chip since he was a kitten. Despite …read more
Continue reading Ask Hackaday: What Is The Future Of Implanted Electronics?
I’m attempting to build a mechanism to prevent frauds and provide traceability of physical resources in a distributed system. The idea is straightforward: the resource travels hop-by-hop on a network and each hop is held by a… Continue reading How to secure unique identification of physical resources in a distributed system?
Why do DESFire cards and Mifare Plus cards offer a Random UID feature? What risks should it mitigate or what features should it offer?
Section in document: NXP Semiconductors N.V., Application note AN10927, MIFARE product and handling of U… Continue reading Why do DESFire and Mifare Plus cards offer a random UID feature?
Is it possible to use card access readers for something other than physical access? I’ve been reading about Wiegand and OSDP protocols and it looks like the hardware is all based on that (with some proprietary aspects for the… Continue reading Using Access Readers for software access
If you’re the kind of person who has friends, and/or leaves the confines of the basement from time to time, we hear that these “Escape Rooms” are all the rage. Basically you get locked into a room with a couple other people and have to solve various problems and puzzles until you’ve finally made enough progress that they let you out. Which actually sounds a lot like the working conditions here at Hackaday HQ, except they occasionally slip some pizza rolls under the door for us which is nice.
Whichever side you find yourself on in one of these lighthearted …read more
Continue reading Held Captive by Arduino and Multiple RFID Readers