fptrs
fptrs
Hi @madalinaStreche, did you already take a look at #220?
Hi @AngelSotomayor, the FW does not feature an ISO15693 reader yet. We used another reader to extract the content of the tag. But we did not need this content to...
Hi @AngelSotomayor, the app reads each block of the tag with ```6220```. You can use the information shown in the app to emulate this tag with the EM4233 config as...
Hi @FrankWu100, I just merged #253, what is the difference to your pull request?
> > > > Hi @FrankWu100, > > I just merged #253, what is the difference to your pull request? > > Just use the same code from MifareUltralight.c and...
We really appreciate both of your contributions. I think for the time being we keep @gcammisa approach since it is easier for beginners to get into the code. If we...
Hi @anonymix007, yes it is possible to emulate TI256. The Chameleon already supports ISO15693 Tags. For testing you can use the EM4233 config or the TITAGITSTANDARD. If you encounter any...
Hi @johndekroon, sending the GET_VERSION command to distinguish DesFire tags is indeed the way to go. Good work so far. Do you have troubles implementing it on the Chameleon or...
I think you have to put `60` into the APDU framing. Furthermore you might have to play the anticollision protocol before issuing the GET_VERSION command
You can take a look into the code from the [libfreefare](https://github.com/nfc-tools/libfreefare) examples. They have implemented a `mifare_desfire_get_version` function.