<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: NFC reader success: HSL matkakortti</title>
	<atom:link href="http://www.epanorama.net/blog/2013/12/03/nfc-reader-success-hsl-matkakortti/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/12/03/nfc-reader-success-hsl-matkakortti/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 21:59:57 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/12/03/nfc-reader-success-hsl-matkakortti/comment-page-1/#comment-1784038</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 20 Oct 2022 19:33:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=23339#comment-1784038</guid>
		<description><![CDATA[https://hackaday.com/2022/10/18/front-door-keys-hidden-in-plain-sight/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2022/10/18/front-door-keys-hidden-in-plain-sight/" rel="nofollow">https://hackaday.com/2022/10/18/front-door-keys-hidden-in-plain-sight/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/12/03/nfc-reader-success-hsl-matkakortti/comment-page-1/#comment-1784037</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 20 Oct 2022 19:32:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=23339#comment-1784037</guid>
		<description><![CDATA[https://hackaday.com/2022/10/17/hunt-down-nfc-signals-with-this-nfc-multi-tool/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2022/10/17/hunt-down-nfc-signals-with-this-nfc-multi-tool/" rel="nofollow">https://hackaday.com/2022/10/17/hunt-down-nfc-signals-with-this-nfc-multi-tool/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/12/03/nfc-reader-success-hsl-matkakortti/comment-page-1/#comment-1726744</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 05 Oct 2021 13:16:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=23339#comment-1726744</guid>
		<description><![CDATA[What’s On Your Bank Card? Hacker Tool Teaches All About NFC And RFID
https://hackaday.com/2021/10/04/whats-on-your-bank-card-hacker-tool-teaches-all-about-nfc-and-rfid/

The Flipper Zero hacker tool is a multipurpose hacker tool that aims to make the world of hardware hacking more accessible with a slick design, wide array of capabilities, and a fantastic looking UI. They are struggling with manufacturing delays like everyone else right now, but there’s a silver lining: the team’s updates are genuinely informative and in-depth. The latest update is all about RFID and NFC, and how the Flipper Zero can interact with a variety of contactless protocols.

Contactless tags are broadly separated into low-frequency (125 kHz) and high-frequency tags (13.56 MHz), and it’s not really possible to identify which is which just by looking at the outside. Flipper Zero can interface with both, but the update at the link above goes into considerable detail about how these tags are used in the real world, and what they look like from both the outside and inside.

Low-frequency tags are “dumb” and incapable of encryption or two-way communication, but what about high-frequency (often referred to as NFC) like bank cards and applications like Apple Pay? One thing demonstrated is that mobile payment methods offer up considerably less information on demand than a physical bank or credit card. With a physical contactless card it’s possible to read the full card number, expiry date, and in some cases the name as well as recent transactions. Mobile payment systems (like Apple or Google Pay) don’t do that.

Diving into RFID Protocols with Flipper Zero
https://blog.flipperzero.one/rfid/]]></description>
		<content:encoded><![CDATA[<p>What’s On Your Bank Card? Hacker Tool Teaches All About NFC And RFID<br />
<a href="https://hackaday.com/2021/10/04/whats-on-your-bank-card-hacker-tool-teaches-all-about-nfc-and-rfid/" rel="nofollow">https://hackaday.com/2021/10/04/whats-on-your-bank-card-hacker-tool-teaches-all-about-nfc-and-rfid/</a></p>
<p>The Flipper Zero hacker tool is a multipurpose hacker tool that aims to make the world of hardware hacking more accessible with a slick design, wide array of capabilities, and a fantastic looking UI. They are struggling with manufacturing delays like everyone else right now, but there’s a silver lining: the team’s updates are genuinely informative and in-depth. The latest update is all about RFID and NFC, and how the Flipper Zero can interact with a variety of contactless protocols.</p>
<p>Contactless tags are broadly separated into low-frequency (125 kHz) and high-frequency tags (13.56 MHz), and it’s not really possible to identify which is which just by looking at the outside. Flipper Zero can interface with both, but the update at the link above goes into considerable detail about how these tags are used in the real world, and what they look like from both the outside and inside.</p>
<p>Low-frequency tags are “dumb” and incapable of encryption or two-way communication, but what about high-frequency (often referred to as NFC) like bank cards and applications like Apple Pay? One thing demonstrated is that mobile payment methods offer up considerably less information on demand than a physical bank or credit card. With a physical contactless card it’s possible to read the full card number, expiry date, and in some cases the name as well as recent transactions. Mobile payment systems (like Apple or Google Pay) don’t do that.</p>
<p>Diving into RFID Protocols with Flipper Zero<br />
<a href="https://blog.flipperzero.one/rfid/" rel="nofollow">https://blog.flipperzero.one/rfid/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/12/03/nfc-reader-success-hsl-matkakortti/comment-page-1/#comment-1267399</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 23 Oct 2014 07:00:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=23339#comment-1267399</guid>
		<description><![CDATA[Android NFC hack allow users to have free rides in public transportation
https://securelist.com/blog/virus-watch/67283/android-nfc-hack-allow-users-to-have-free-rides-in-public-transportation/

&quot;Tarjeta BIP!&quot; is the electronic payment system used in Chile to pay for public transportation via NFC incorporated in the user&#039;s smartphone. Numerous projects enabling mobile NFC ticketing for public transportation have been already executed worldwide. This is a trend. It means that criminal minds should be interested in it. Moreover, they are.

More and more people keep talking about the feature of payments via NFC. The problem in this particular case is that somebody reversed the &quot;Tarjeta BIP!&quot; cards and found a means to re-charge them for free. So, on Oct. 16 the very first widely-available app for Android appeared, allowing users to load these transportation cards with 10k Chilean pesos, a sum  equal to approximately $17 USD.

Immediately after appearing on the Internet, many users downloaded it and proved they were able to recharge their travel cards. 

Since the app is a hot one and a lot of people from Chile are looking for it, I expect some bad guys to come along and create fake similar apps but trojanized to infect mobile users and take some advantage of their interest.]]></description>
		<content:encoded><![CDATA[<p>Android NFC hack allow users to have free rides in public transportation<br />
<a href="https://securelist.com/blog/virus-watch/67283/android-nfc-hack-allow-users-to-have-free-rides-in-public-transportation/" rel="nofollow">https://securelist.com/blog/virus-watch/67283/android-nfc-hack-allow-users-to-have-free-rides-in-public-transportation/</a></p>
<p>&#8220;Tarjeta BIP!&#8221; is the electronic payment system used in Chile to pay for public transportation via NFC incorporated in the user&#8217;s smartphone. Numerous projects enabling mobile NFC ticketing for public transportation have been already executed worldwide. This is a trend. It means that criminal minds should be interested in it. Moreover, they are.</p>
<p>More and more people keep talking about the feature of payments via NFC. The problem in this particular case is that somebody reversed the &#8220;Tarjeta BIP!&#8221; cards and found a means to re-charge them for free. So, on Oct. 16 the very first widely-available app for Android appeared, allowing users to load these transportation cards with 10k Chilean pesos, a sum  equal to approximately $17 USD.</p>
<p>Immediately after appearing on the Internet, many users downloaded it and proved they were able to recharge their travel cards. </p>
<p>Since the app is a hot one and a lot of people from Chile are looking for it, I expect some bad guys to come along and create fake similar apps but trojanized to infect mobile users and take some advantage of their interest.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dragonvale</title>
		<link>https://www.epanorama.net/blog/2013/12/03/nfc-reader-success-hsl-matkakortti/comment-page-1/#comment-34691</link>
		<dc:creator><![CDATA[Dragonvale]]></dc:creator>
		<pubDate>Sat, 07 Dec 2013 09:19:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=23339#comment-34691</guid>
		<description><![CDATA[Thanks very &amp;X6E;ice blog!]]></description>
		<content:encoded><![CDATA[<p>Thanks very &#038;X6E;ice blog!</p>
]]></content:encoded>
	</item>
</channel>
</rss>
