Once-the.rockets/are-up..who/cares-where.they/come-down.That's

N.O-T/MY-D/E.PA/R.T-ME-N/T.

2.9-C/3


RFID hacking
Weblink for assembly
Description: We have RFID hardware and software to read nearly all the cards you have in your pocket. So we can at least determine the typ of the card and can say something about its security. Depending on the type we also can readout or change the content. We also will have a zapper for disabling your RFID cards.
Parts of assembly Yuvadm
Organizational information
Orga contact starbugURIs of the form "starbug" are not allowed.
Area 1a
Things we bring a setup to read and write RFID cards.

a zapper to destroy RFID cards.

Local workshops/lectures maybe
Planned workshop/lectures we could talk about the security of RFID systems. show people how to read, write and physically disable their cards.
Member seats 6
Lecture seats 2
Power consumption just some notebooks
Planning notes we need 2 tables with 6 seats for our group and one additional table with 2 seats for people coming to play with our RFID setup.
Other Assemblies

We have RFID hardware and software to read nearly all the cards you have in your pocket. So we can at least determine the typ of the card and can say something about its security. Depending on the type we also can readout or change the content. We also will have a zapper for disabling your RFID cards.

Archived page - Impressum/Datenschutz