[Noisebridge-discuss] clipper card hacking

Ryan Rawson ryanobjc at gmail.com
Tue Oct 5 03:40:23 UTC 2010


Here is what I know:

- Clipper is a smartcard, with stored information, presumably encrypted.
- According to wikipedia:  "The Clipper card was developed by
Australlian-based ERG Group and Motorola under the ERG-Motorola
alliance in April 1999"
- According to my coworker: ERG is a typical systems integrator,
meaning we can count on jr and ineffective teams being put to work on
the project
- Will need hardware readers, perhaps clipper card is
http://en.wikipedia.org/wiki/ISO/IEC_14443
- Encryption might become an issue

Some basic experimenting indicates that the terminals seem to have the
possibility of operating standalone w/o network connection, they were
able to tell me pretty quickly that my card was still good for a
transfer, etc.  This information presumably stored back to the card.

Still trying to figure out more. I should look at those MIT students
who researched charlie card.

On Mon, Oct 4, 2010 at 7:34 PM, aditya bhargava <aditya at wefoundland.com> wrote:
> This sounds very cool. I have software experience, although no hacking
> experience. Does that count?
>
>
>
> On Mon, Oct 4, 2010 at 6:56 PM, Ryan Rawson <ryanobjc at gmail.com> wrote:
>>
>> Anyone interested in doing some hacking on the clipper card?  I'm not
>> interested in free trips, but I would like to do things like read my
>> card, understand how it works, get to the root cause of why it is
>> slow, etc.
>>
>> I have no hardware, but plenty of software expertise and I can solider :-)
>>
>> -ryan
>> _______________________________________________
>> Noisebridge-discuss mailing list
>> Noisebridge-discuss at lists.noisebridge.net
>> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
>
>
>
> --
> wefoundland.com
>



More information about the Noisebridge-discuss mailing list