[Nils Pipenbrinck] has been working on a very interesting problem. The SIM card in your cellphone talks to the contactless near-field communication (NFC) chip through a cool protocol that we’d never hear of until reading his blog: single wire protocol (SWP).
The SIM card in your cellphone has only a limited number of physical connections — and by the time NFC technology came on the scene all but one of them was in use. But the NFC controller and the SIM need full-duplex communications. So the SWP works bi-directionally on just one wire; one device modulates the voltage on the line, while the other modulates the current, essentially by switching a load in and out.
This signalling protocol makes snooping on this data line tricky. So to start off his explorations with SWP, [Nils] built his own transceiver. That lead [Nils] to some very sensitive analog sniffer circuit design that he’s just come up with.
If you get interested in SWP, you’ll find the slides from this fantastic presentation (PDF) helpful, and they propose a solution very similar to the one that [Nils] ended up implementing. That’s not taking anything away from [Nils]’s amazing work: with tricky high-speed analog circuitry like this, the implementation can be more than half of the battle! And we’ll surely be following [Nils]’s blog to see where he takes this.
Banner image: An old version and a new version of the transceiver prototype.
Thanks to [Tim Riemann] for the tip!
A few years ago, we saw a project from a few researchers in Germany who built a device to clone contactless smart cards. These contactless smart cards can be found in everything from subway cards to passports, and a tool to investigate and emulate these cards has exceptionally interesting implications. [David] and [Tino], the researchers behind the first iteration of this hardware have been working on an improved version for a few years, and they’re finally ready to release it. They’re behind a Kickstarter campaign for the ChameleonMini, a device for NFC security analysis that can also clone and emulate contactless cards.
While the original Chameleon smart card emulator could handle many of the contactless smart cards you could throw at it, there at a lot of different contactless protocols. The new card can emulate just about every contactless card that operates on 13.56 MHz.
The board itself is mostly a PCB antenna, with the electronics based on an ATXMega128A4U microcontroller. This micro has AES and DES encryption engines, meaning if your contactless card has encryption and you have the cryptographic key, you can emulate that card with this device. They’re also making a more expensive version that also has a built-in reader that makes the ChameleonMini a one-stop card cloning tool.
Back in the day, we had smartphones with physical buttons. Not just power, volume, and maybe another button on the front. Whole, slide-out QWERTY keyboards right on the underside of the phone. It was a lawless wasteland, but for those who yearn for the wild-west days of the late 2000s, [Liviu] has recreated the shortcut buttons that used to exist on the tops of these keyboards for modern-day smartphones.
There were lots of phones that had shortcut keys on their keyboards, but [Liviu] enjoyed using the ones that allowed him to switch between applications (or “apps” as the kids are saying these days) such as the calendar, the browser, or the mail client. To recreate this, he went with a few NFC tags. These devices are easily programmed via a number of apps from your app store of choice, and can be placed essentially anywhere. In order to make them visible to the phone at any time, though, he placed the tags inside a clear plastic case for his phone and can now use them anytime.
If you’ve never used or programmed an NFC tag, this would be a great project to get yourself acquainted with how they operate. Plus, you could easily upgrade this project to allow the tags to do any number of other things. You can take projects like this as far as you want.
Continue reading “NFC Tags Add Old-School Functionality to New Phone”
We have our featured speakers lined up for the Hackaday Supercon, one of which is [Fran Blanche]. We’ve seen a lot of her work, from playing with pocket watches to not having the funding to build an Apollo Guidance Computer DSKY. In her spare time, she builds guitar pedals, and there’s a biopic of her in She Shreds magazine.
Halloween is coming, and that means dressing children up as pirates, fairies, characters from the latest Marvel and Disney movies, and electrolytic capacitors.
There’s a new movie on [Steve Jobs]. It’s called the Jobs S. It’s a major upgrade of the previous release, featuring a faster processor and more retinas. One more thing. Someone is trying to cash in on [Woz]’s work. This time it’s an auction for a complete Apple I that’s expected to go for $770,000 USD.
Hackaday community member [John McLear] is giving away the factory seconds of his original NFC ring (think jewelry). These still work but failed QA for small reasons and will be fun to hack around on. You pay shipping which starts at £60 for 50 rings. We’ve grabbed enough of them to include in the goody bags for the Hackaday Superconference. If you have an event coming up, getting everyone hacking on NFC is an interesting activity. If you don’t want 50+, [John] is also in the middle of a Kickstarter for an improved version.
Your 3D printed parts will rarely come out perfectly. There will always be some strings or scars from removing them from the bed. There’s a solution to these problems: use a hot air gun.
Everyone has a plumbus in their home, but how do they do it? First, they take the dinglebop, and smooth it out with a bunch of schleem. The schleem is then repurposed for later batches.
You are at the corner store, buying gum. The cashier rings up the purchase, showing you the amount. You casually pull out your cell phone and wave it near the credit card machine, which beeps appreciatively. The cashier nods, and you walk out, stuffing gum into your face. What just happened? You used Near Field Communications (NFC) to send data between your phone and the credit card terminal.
NFC is a standard that allows two devices to exchange information over a short distance without being in physical contact. The two devices communicate using a weak magnetic field that, in theory, only has a range of a few centimeters, so both devices have to be physically close, and someone standing nearby can’t intercept or alter the signal.
Continue reading “Hackaday Dictionary: Near Field Communications (NFC)”
“We accept pain as a price of doing business, even if it is just for aesthetic purposes. You want to put a magnet in your finger, a doctor will ask you why; a mod artist will ask when you can start.” As with many other people who are part of the growing grinder movement, [Adam] has taken a step that many would consider extreme – he’s begun to augment his body.
Grinders – men and women who hack their own bodies – are pushing the boundaries of what is currently possible when it comes to human augmentation. They’re hackers at heart, pursuing on an amateur level what they can’t get from the consumer market. Human augmentation is a concept that is featured heavily in science fiction and futurism, but the assumption most people have is that those kinds of advancements will come from medical or technology companies.
Instead, we’re seeing augmentation begin in the basements of hackers and in the back rooms of piercing studios. The domain of grinders is the space where body modification and hacking meet. It mixes the same willingness to modify one’s body that is common among the tattooed and pierced, and adds an interest in hacking technology that you find in hackerspaces around the world. When those two qualities intersect, you have a potential grinder.
Continue reading “CyberPunk Yourself – Body Modification, Augmentation, and Grinders”
[Sigurd] manage to obtain an old vending machine from his dorm. The only problem was that the micocontroller on the main board was broken. He and his friend decided they could most likely get the machine back into working order, but they also knew they could probably give it a few upgrades.
This system uses two Arduino Pro Minis and an Electric Imp to cram in all of the new features. One Arduino is connected to the machine’s original main board. The Arduino interfaces with some of the shift registers, relays, and voltage regulators. This microcontroller also lights up the buttons on the machine as long as that particular beverage is not empty. It controls the seven segment LED display, as well as reading the coin validator.
The team had to reverse engineer the original coin validator in order to figure out how the machine detected and counted the coins. Once they figured out how to read the state of the coins, they also built a custom driver board to drive the solenoids.
A second Arduino is used to read NFC and RFID cards using a Mifare RC522 reader. The system uses its own credit system, so a user can be issued a card with a certain amount of pre-paid credit. It will then deduct credit appropriately once a beverage is vended. The two Arduinos communicate via Serial.
The team also wanted this machine to have the ability to communicate with the outside world. In this case, that meant sending cheeky tweets. They originally used a Raspberry Pi for this, but found that the SD card kept getting corrupted. They eventually switched to an Electric Imp, which worked well. The Arduino sends a status update to the Imp every minute. If the status changes, for example if a beverage was dispensed, then the Imp will send a tweet to let the world know. It will also send a tweet to the maintenance person if there is a jam or if a particular slot becomes empty. Continue reading “A Tweeting Vending Machine”