[Noisebridge-discuss] clipper card hacking
Ryan Rawson
ryanobjc at gmail.com
Tue Oct 5 03:40:23 UTC 2010
Here is what I know:
- Clipper is a smartcard, with stored information, presumably encrypted.
- According to wikipedia: "The Clipper card was developed by
Australlian-based ERG Group and Motorola under the ERG-Motorola
alliance in April 1999"
- According to my coworker: ERG is a typical systems integrator,
meaning we can count on jr and ineffective teams being put to work on
the project
- Will need hardware readers, perhaps clipper card is
http://en.wikipedia.org/wiki/ISO/IEC_14443
- Encryption might become an issue
Some basic experimenting indicates that the terminals seem to have the
possibility of operating standalone w/o network connection, they were
able to tell me pretty quickly that my card was still good for a
transfer, etc. This information presumably stored back to the card.
Still trying to figure out more. I should look at those MIT students
who researched charlie card.
On Mon, Oct 4, 2010 at 7:34 PM, aditya bhargava <aditya at wefoundland.com> wrote:
> This sounds very cool. I have software experience, although no hacking
> experience. Does that count?
>
>
>
> On Mon, Oct 4, 2010 at 6:56 PM, Ryan Rawson <ryanobjc at gmail.com> wrote:
>>
>> Anyone interested in doing some hacking on the clipper card? I'm not
>> interested in free trips, but I would like to do things like read my
>> card, understand how it works, get to the root cause of why it is
>> slow, etc.
>>
>> I have no hardware, but plenty of software expertise and I can solider :-)
>>
>> -ryan
>> _______________________________________________
>> Noisebridge-discuss mailing list
>> Noisebridge-discuss at lists.noisebridge.net
>> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
>
>
>
> --
> wefoundland.com
>
More information about the Noisebridge-discuss
mailing list