I ASS-U-ME-D the same thing, but it said postsā¦:technically" I suppose they are posts.
But that also makes sense, as I imagine you get a lot too many
I ASS-U-ME-D the same thing, but it said postsā¦:technically" I suppose they are posts.
But that also makes sense, as I imagine you get a lot too many
I donāt think I took convincing to GET the implant, I came here after all because I wanted one lol , I just had a lot of analysis paralysis though so the rest is spot on
Also Iām still full of questions
Thatās where I am with magnets right now. Analysis paralysis is the best possible term for it. I honestly donāt need it but christ, implants are more addictive than tattoos or piercings imho
Considering I have 10 implants and 2 tattoos, Iād agree lol
Best thing to get me over the analysis paralysis, was nothing ventured nothing gained
This is hacker shit and we color outside the lines, sometimes it works, sometimes it doesnātā¦ but you learn as you go
I tried 2 different, out of the norm magnet installs and neither worked like I wanted it to, there just wasnāt any way to know if it would work besides just doing it
The chance that it would work, was worth taking the risk it didnāt
Iām not an early adopter. I like observing, letting the bugs get worked out and I really pay choose attention to the iwishi peoples comments. I base a lot of my decisions from them.
It reminds me of the OLD OLD school Toonami mascot Tom. Even down to the robot design choices. but the whole old world that Tom and Toonami had feels just like this app.
HOW ARE YOU HOLDING YOUR PHONE RIGHT NOW?
0 voters
Very interestingā¦ anyone have the paper?
My first thought is that access control readers are dealing with access cards not smart cards. Smart cards do not typically use symmetric key solutions like access cards do. A smart card solution using public key asymmetric cryptography would only require the reader deal with a public key and signature validation, so even if you were able to extract exactly what the reader was doing to validate a challenge response or a signed response, you would only get the public key and it would be worthless. Definitions of terms matter, but especially in the security context of this video and probably the paper.
The other thing that comes to mind is the idea of readers at doors performing symmetric cryptographic processes with the access cards directly. I know this is how itās done in the industry, but itās dumb for so many reasons. Really your keys should be programmed into and stored in a central controller and readers should interact with that controller to pass data only. The reader should be no more than an extension of the communication channels required to talk to the card.
Scenarios where readers contain keys within themselves to validate symmetric cryptographic activities in the cardā¦ HID iClass comes to mindā¦ sure those might be vulnerableā¦ But I would never call an iClass access card or even a desfire card a āsmart cardā or āsecure elementā.
Link to the paper here
Its no different comparing a wall reader to a gate. Sure with enough time you can cut a hole or climb over, im sure with enough time and not being interrupted someone could hack the reader, but itās like all security protocols itāll be complimented with either a manned security or cctv.
@StarGazer1258 sent it to me yesterday, its now all implemented for
Light, Dark, Mobile and Desktop
Thanks for your work @StarGazer1258
Finally got my regular badge back!
My grandfather always told me that as I got older I would come to appreciate the importance of being regular.
Can confirm I lurked for about two years before making an account after finally getting my first implant
in fairness, I agree, and I have personally heard a 50cal called that FAR MORE (ALMOST exclusively) than the metric equivalent (12.7mm)
However, i have NEVER heard the āstandardā equivalent of 20mm and 30mm cannons.
That is how the rest of the world feel about US āStandardā
I see EVERYTHING
A biorg?
Grobyc