TrustPoint Blog › nfc-security

NFC Security: Part 1: NFC Tag Reader/Writer

NFC security is highly dependant on the targeted application and mode of operation. This post explores the three modes of NFC: Tag Reader/Writer, Card Emulation and Peer to Peer (P2P) mode.

Continue reading full post

What is the purpose of NFC NDEF Signature Records?

This question was posted a few years ago by Eric VĂ©tillard in this blog post.

Continue reading full post

About this Blog

The TrustPoint Blog covers security industry topics relating to ECC, Certificates, and machine-to-machine communication.

More Categories