fptrs

Results 28 comments of fptrs

Hi @madalinaStreche, did you already take a look at #220?

Hi @AngelSotomayor, the FW does not feature an ISO15693 reader yet. We used another reader to extract the content of the tag. But we did not need this content to...

Hi @AngelSotomayor, the app reads each block of the tag with ```6220```. You can use the information shown in the app to emulate this tag with the EM4233 config as...

Hi @FrankWu100, I just merged #253, what is the difference to your pull request?

> > > > Hi @FrankWu100, > > I just merged #253, what is the difference to your pull request? > > Just use the same code from MifareUltralight.c and...

We really appreciate both of your contributions. I think for the time being we keep @gcammisa approach since it is easier for beginners to get into the code. If we...

Hi @anonymix007, yes it is possible to emulate TI256. The Chameleon already supports ISO15693 Tags. For testing you can use the EM4233 config or the TITAGITSTANDARD. If you encounter any...

Hi @johndekroon, sending the GET_VERSION command to distinguish DesFire tags is indeed the way to go. Good work so far. Do you have troubles implementing it on the Chameleon or...

I think you have to put `60` into the APDU framing. Furthermore you might have to play the anticollision protocol before issuing the GET_VERSION command

You can take a look into the code from the [libfreefare](https://github.com/nfc-tools/libfreefare) examples. They have implemented a `mifare_desfire_get_version` function.