Rejsekort: Difference between revisions

Content deleted Content added
Mispelling
Tags: Visual edit Mobile edit Mobile web edit
Written like an advertisement (link to some specific NFC reader on a dodgy looking site)
Tags: Visual edit Mobile edit Mobile web edit
Line 55:
The card technology is [[MIFARE|MIFARE Classic]].<ref name=1eye /> The card has a 4 kilobyte [[electrically erasable programmable read-only memory]] (EEPROM) which can be written to using [[RFID]]. The card also contains a chip by [[NXP Semiconductors]] which implements a proprietary cryptography scheme called [[CRYPTO1]], which was fully reverse-engineered in 2008.<ref name=1eye /> ''A Practical Attack on the MIFARE Classic'' was published in 2008 by a group at [[Radboud University Nijmegen]].<ref name=1eye />
 
The ride history is stored on the card unencrypted and can be read by anyone. usingThere e.gare mobile apps made by third parties which can achieve this.<ref>{{Cite aweb [|title=Rejsekortlæser - Apps on Google Play |url=https://proxmarkplay.google.com/proxmark-3-hardwarestore/proxmarkapps/details?id=com.bangbits.rejsekortscanner&hl=en_US&gl=US |access-date=2022-305-rdv401 Proxmark 3 RDV4] reader|website=play.<refgoogle.com name|language=1eye en}}</ref>
 
==Timetable for implementation==