http://radiowar.org/security/android-nfc-project-nfc-war.htmlThe video demonstrates the app's basic functionality. Anyway, stay in the force!
Note:
1, the program's NFC icon for the plagiarism of a foreign access icon:)
2, the program video has fully explained the function and related introduction.
3, write card function also has the improvement function, and has been in the Beta friend's suggestion
4. The program prototype is the demo video-app "Samsung NFC Reader App demo Video".
5, for some friends said the change (Write) function did not join the problem, because the video recording rush we have a few functional modules are not recorded in
6, for whether there are bright spots, we look at the video in the internal time said there is no bright spot to speak of! Before we finish this version, Google play already has "Mifare Classic Scanner"! Our app is just for our ideas to complete, not to find demo/take doctrine JS and written.
7, if a friend has written the relevant app, it may be shared to everyone, we will release the official version of Mobile in mid-August.
8, in the PROXMARK3 Group of students have already known,NFC-war Complete the function is perfect after will start to simulate the tag part to test! The first is to thank a foreign professor for Nexuss and NokiaC7 's research report, not xda! XDA is just a fan of the complete Google Wallet feature perfect! We're looking at this video and it's clear. Google Wallet for SamSung Galaxy SIII
The above content is as a recent friend for our two video demonstration of the non-pragmatic explanation, but also for our two-part demonstration video commentary explanation! I welcome everyone to comment on what we have said, but please take a pragmatic and friendly attitude! Or your technology is very good, can judge us, but does not mean that you have such a qualification. Normal technical discussions are supposed, but non-technical discussions with purpose are not welcome! Thank you
Related articles List
- Looking at Mifare Classic Security (RANDOM-0.750) from the analysis of black cloud error holes