Check out the project on GitHub. In my previous post about NFC security models, I explained why a hardware token that is able to do some computation on its own is required for a secure (enough) authentication. The obvious solution would be to use a YubiKey, however I want to use my own code and control the hardware as well… Read More →
NFC Hacking: Part 2 – Building Custom Hardware Tokens
Posted on