Can the NFC cards be emulated? If not, why? I am not any sort of expert in NFC technology, so I don't know how the different cards vary physically or their operations. If the differences are just in code then a bit for bit copy should do the job. What prevents that from happening?
About if a RFID or NFC chip/card can be emulated, depends of the implementation. Secure implementations, such as NFC payment cards are basen on a key that is stored in the secure chip of the card. The messages from the reader that is sent to the card can be encrypted and only decrypted by the key in the card. Vice versa - the message from the card is encrypted with the stored secret key, and can only be decrypted by a key on the server side. I have explained some of this in the video about RDIF access to doors - ua-cam.com/video/K1atb194IBs/v-deo.html and also when using credit cards - ua-cam.com/video/-I-P3JQqSf0/v-deo.html
@@techandfun7723 So if I got this right, the card sends out an identifier to the server, the server sends back a challenge and then the card sends a response, which is then authenticated by the server, which then sends an authorization to the lock/merchant/car/etc.? In the case of Teslas, the server is in the car, or is it online? I am assuming the cards work whether car has a web connection or not. Producing the identifier requires a reader sending a query to the card. That identifier, regardless of encryption can be captured raw, I would think. Does the challenge then query a lookup table on the card, which then plugs the response number into an equation, which then spits out a one-time response? The server also has a copy of this table, runs the same equation, compares the outputs, and in the event of congruency sends the authorization? Obviously, cracking that would require more cycles and bigger numbers than an F0 will ever be capable of. Amirite?
@@mattesrawer6621 Ummmm....no, it's not just a rolling code. It authorizes like a credit card with a rolling code then challenge and response server. Rolling code would be almost easy. Teslas are not. Thanks for the suggestion, tho.
Where did you buy that cable? Im looking for one that has the port opener integrated. Ty
And that works on all teslas?
Can you upload it? My uncle has a Tesla (model Y) and I really want to do it 😅
I mean that with the charging Lid
Nice video. Do u know the numbers here in the US?
US and Japan use 315MHz
can you use this device to open tesla frunk>?
if you mean a tesla trunk then no i dont think so no sorry
No theft 🤡 🐒
Do not steal a car with it it will harm others and *you*
where is files plz???
Can the NFC cards be emulated? If not, why? I am not any sort of expert in NFC technology, so I don't know how the different cards vary physically or their operations. If the differences are just in code then a bit for bit copy should do the job. What prevents that from happening?
About if a RFID or NFC chip/card can be emulated, depends of the implementation. Secure implementations, such as NFC payment cards are basen on a key that is stored in the secure chip of the card. The messages from the reader that is sent to the card can be encrypted and only decrypted by the key in the card. Vice versa - the message from the card is encrypted with the stored secret key, and can only be decrypted by a key on the server side. I have explained some of this in the video about RDIF access to doors - ua-cam.com/video/K1atb194IBs/v-deo.html and also when using credit cards - ua-cam.com/video/-I-P3JQqSf0/v-deo.html
@@techandfun7723 So if I got this right, the card sends out an identifier to the server, the server sends back a challenge and then the card sends a response, which is then authenticated by the server, which then sends an authorization to the lock/merchant/car/etc.? In the case of Teslas, the server is in the car, or is it online? I am assuming the cards work whether car has a web connection or not. Producing the identifier requires a reader sending a query to the card. That identifier, regardless of encryption can be captured raw, I would think.
Does the challenge then query a lookup table on the card, which then plugs the response number into an equation, which then spits out a one-time response? The server also has a copy of this table, runs the same equation, compares the outputs, and in the event of congruency sends the authorization?
Obviously, cracking that would require more cycles and bigger numbers than an F0 will ever be capable of. Amirite?
@@mattesrawer6621 Ummmm....no, it's not just a rolling code. It authorizes like a credit card with a rolling code then challenge and response server. Rolling code would be almost easy. Teslas are not. Thanks for the suggestion, tho.
@@techandfun7723does it work on model y
boring? you some kind of sore tesla owner?