If you're interested in reverse engineering RFID payment systems in public transfer, I can recommend you this talk from 27c3: <a href="https://events.ccc.de/congress/2010/Fahrplan/events/4036.en.html" rel="nofollow">https://events.ccc.de/congress/2010/Fahrplan/events/4036.en....</a>
Video: <a href="http://mirror.fem-net.de/CCC/27C3/mp4-h264-HQ/27c3-4036-en-reverse_engineering_a_real_word_rfid_payment_system.mp4" rel="nofollow">http://mirror.fem-net.de/CCC/27C3/mp4-h264-HQ/27c3-4036-en-r...</a>
Awesome app. I've been looking for some small nfc hacking projects, and might look at getting this working properly with Oyster or something (provided I can get my hands on an updated DESfire one rather than my existing Mifare Classic).
This is great! I was wondering if you could read data from RFID chips using the NFC since the protocols are nearly identical. I wonder if you could create an app that just indiscriminately reads data raw from the NFC chip?
This is a serious security problem for San Francisco public transit... "in addition to being able to read cards, also have the capability to emulate a card".
I had considered duplicating a card, since it's a tag based system. So two or more people could share things like a month Caltrain pass, or two people riding together on the bus could both tag and only pay once. Using this program would be certainly easier, than what I was thinking.