[fbz] wanted to make sure that everyone knows that RFID Guardian has released the latest version of their design. I had a hard time finding a good shot of the hardware, so I went with the Nokia phone control application. There’s a short explanation of the project here. I’d point at the use examples on the site, but it seems that their MYSQL server is running out of memory. After seeing this talk at shmoocon last year, and a bit more reinforcement at defcon, there are definitely some good uses for the guardian. (Once you get past the slow start, Major’s intro is funny as hell. – jump past the first 8 minutes or you’ll be bored.)
5 thoughts on “RFID Guardian V3 Released”
Leave a Reply
Please be kind and respectful to help make the comments section excellent. (Comment Policy)
http://english.chosun.com/w21data/html/news/200711/200711060005.html
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9028763
http://gigaom.com/2006/12/17/google-phone/
http://www.engadget.com/2007/01/18/the-google-switch-an-iphone-killer/
http://www.boston.com/business/technology/articles/2007/09/02/introducing_the_google_phone/
http://blogs.zdnet.com/Google/?p=503
http://www.openmoko.org/
http://en.wikipedia.org/wiki/Android_%28mobile_phone_platform%29
http://www.openhandsetalliance.com/android_overview.html
google phone, hackaday, lets see what can be done with this!
Wow, seems complicated:
I like the RFID-Zapper more. It destroys RFID tags :)
https://events.ccc.de/congress/2005/static/r/f/i/RFID-Zapper(EN)_77f3.html
I have a sony rfid usb device, PaSoRi. Is there any sort of third party software/driver already in existence I can play with?
Adam Laurie’s presentation does show that the ID can be cloned. I still do suspect that both the RFID manufacturers and RFID opponents overstate the capabilities of the RF side of the system. As best I can tell the RFID Guardian works by creating malicious interference. illegal in most countries, that try to keep the RF spectrum usable. A widespread use of such devices will be noticed. When/if it is expect to find mere possession will be illegal.
The RFID database Virus and Worm where cool.
I’d still like to see more research on algorithmic passive RFID like car keys use though. Making a hardware AV solution isn’t really exiting cause outside the professional community it’s not really being attacked yet.