NFC Security: Part 1: NFC Tag Reader/Writer
NFC security is highly dependant on the targeted application and mode of operation. This post explores the three modes of NFC: Tag Reader/Writer, Card Emulation and Peer to Peer (P2P) mode.
NFC security is highly dependant on the targeted application and mode of operation. This post explores the three modes of NFC: Tag Reader/Writer, Card Emulation and Peer to Peer (P2P) mode.
This question was posted a few years ago by Eric VĂ©tillard in this blog post.