Are there any contactless (RFID/NFC) card vulnerabilities that are still unsolved? even minor ones

The title is pretty self explanatory. The market is pretty secretive about these kinds of matter since companies won’t give out vulnerabilities for attackers to abuse and will give out vulnerabilities that are solved and attackers would th… Continue reading Are there any contactless (RFID/NFC) card vulnerabilities that are still unsolved? even minor ones

Smartphone-powered athletic “smart suit” needs no batteries

When it comes to tracking an athlete’s performance, a single wearable sensor doesn’t always provide much information, yet multiple hard-wired sensors restrict movement. That’s a where a new sensor suit comes in – and it’s powered by a smartphone.Contin… Continue reading Smartphone-powered athletic “smart suit” needs no batteries

Hackaday Podcast 082: DJ CNC, NFC Black Box, Sound of Keys, and Payin’ for 3D Prints

Hackaday editors Elliot Williams and Mike Szczys check in on the best hacks from the past week. All the buzz is the algorithm that can reverse engineer your house keys from the way they sound going into the lock. Cardboard construction goes extreme with an RC car build that’s beyond …read more

Continue reading Hackaday Podcast 082: DJ CNC, NFC Black Box, Sound of Keys, and Payin’ for 3D Prints

Breaking Smartphone NFC Firmware: the Gory Details

Near-field Communication (NFC) has been around a while and is used for example in access control, small data exchange, and of course in mobile payment systems. With such sensitive application areas, security is naturally a crucial element of the protocol, and therefore any lower-level access is usually heavily restricted and …read more

Continue reading Breaking Smartphone NFC Firmware: the Gory Details

Son of Rothult

We are continuously inspired by our readers which is why we share what we love, and that inspiration flows both ways. [jetpilot305] connected a Rothult unit to the Arduino IDE in response to Ripping up a Rothult. Consider us flattered. There are several factors at play here. One, the …read more

Continue reading Son of Rothult

NFC Ultralight C – design an authentication system (can it be clone protected?)

I am trying to design an authentication system that will be based on NFC Ultralight C cards.
Key concept in my system is that the card identifies a specific person, but this concept can be easily broken if the card can be cloned.
I want to… Continue reading NFC Ultralight C – design an authentication system (can it be clone protected?)