How to duplicate certain RF proximity cards

prox-assembled-standing.jpg

With RFID-type devices becoming more and more ubiquitous in our society, treatment it is good to know some of the advances being made in the security research fields so as to avoid a false sense of security. I came across Jonathan Westhues‘ site which outlines his experiences duplicating certain identification devices. It is important to note that the duplicated devices are of the identification-only type and do not have any built in security mechanisms, however, these are accessible initial steps. Hopefully this will motivate me to do something with the TMS3705A-based RFID reader I built following a sample design.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>