Hey everyone! I’m a longtime member here with the DangerousThings ecosystem, but aside from my participation in some of the earlier beta tests, I’ve been pretty quiet. Lately though, I’ve been trying to get more involved as I’m finding myself with a bit more time (and finally, a bit of pertinent knowledge) to play a more active role in the community.
Because of this, I wanted to share a project I’ve been working on. I’ve been making an Android application that is designed to provide common features that I find myself wanting to use with my NFC implants. The application itself is comparatively barebones to what I have in my head for it in the future, but I am actively working on it most evenings after work.
BioCom
The application is now live here: https://play.google.com/store/apps/details?id=com.hoker.biocom
Current features/options include:
- Basic read/write options for Text NDEF records
- Basic device information (damn fingerprinting these things is hard).
- Erase NFC Tag contents (With true bit randomization)
- Prompt for decryption on detection of PGP encrypted text payload (Demo here)
This started as a simple project to let me more easily decrypt PGP text record stored in my Gen1 flexDF so that all my personal info wasn’t just in plain text in my arm, but seeing that I have had some extra time as of late, I wanted to expand it into an actual “implant toolkit” application. I know that the application is pretty barebones right now, but I’m actively working on it, and am currently trying an idea I had where I can use Intent filters to filter for custom mime types for BioCom and, by extension, be able to store and retrieve actual files (.jpg, .mp3, .md, or custom mapped data) from NFC tags. I’m thinking that I can simply write raw bytes flagged with said mime type, thus allowing the application to know how to parse the retrieved bytes back into the original file type upon filter.
I’ve also got some P60 cards coming from Fidesmo in a few days that I want to start experimenting with. Hopefully I can get some Vivokey specific functionality figured out with a bit of tinkering.
Anyways, hopefully you guys can get some use out of it, and if not, I’ll be sure that you will in the future with a couple of updates:) For those of you with a Vivokey or high capacity tag implanted, I really do recommend giving the decryption feature a try out, as I honestly find myself using it ALL the time, and after about 1K of data, I find that encrypted with PGP doesn’t really add all that much size to a text payload.
If you like the application, be sure to leave a rating, as I’d really appreciate it!
Lastly, if you’d like to tinker with it yourself at all, the project’s GitHub is here: GitHub
I’ll keep this post up to date as updates are finished.