Quote:
Originally Posted by Mleeja
So you’ve seen what all 33 bytes contain? Just because there is a specification for 33 bytes, doesn’t mean they are all being utilized. I worked in an industry where passive RFID systems were used. To ensure accuracy a check digit was used. The user didn’t see the check digit or have access to it. When the RFID code was activated, the check digit was calculated. If it did not match to the embedded check digit in the RFID tag, the transaction was rejected. Any “security” system is not going revel the existence of a security code or allow it to be copied.
|
Yes, using a Flipper Zero (Google
This type of card is widely used in old access control systems around the world. It's pretty dumb, stores only an N-byte ID and has no authentication mechanism, allowing it to be read, cloned and emulated by anyone.
I know what you are referring to but that technology is not in our cards from Y2K.