|
@@ -78,7 +78,7 @@ Example: 365, 136, and 650 can all be found in 13650 by looking at 3 digits indi
|
|
|
| Mifare Ultralight | X | | X | X | Non-password protected |
|
|
| Mifare Ultralight | X | | X | X | Non-password protected |
|
|
|
| EMV Cards | X | | | | Can read bank cards |
|
|
| EMV Cards | X | | | | Can read bank cards |
|
|
|
| NTAG-21X | X | | X | X | |
|
|
| NTAG-21X | X | | X | X | |
|
|
|
-| iClass/PicoPass | X | | | | Third-party app |
|
|
|
|
|
|
|
+| iClass/PicoPass | X | | X | | |
|
|
|
| EM4100/EM4102 | X | | X | X | |
|
|
| EM4100/EM4102 | X | | X | X | |
|
|
|
| H10301 | X | | X | X | |
|
|
| H10301 | X | | X | X | |
|
|
|
| Indala | X | | X | X | |
|
|
| Indala | X | | X | X | |
|
|
@@ -119,4 +119,4 @@ DESFire is a very complicated and much more secure protocol. There are no known
|
|
|
|
|
|
|
|
### What are the .sha files in the NFC directory?
|
|
### What are the .sha files in the NFC directory?
|
|
|
These are shadow files, and they're created whenever an emulated tag is written to.
|
|
These are shadow files, and they're created whenever an emulated tag is written to.
|
|
|
-They store a copy of the original file with whatever was written. This way, the original file remains untouched.
|
|
|
|
|
|
|
+They store a copy of the original file with whatever was written. This way, the original file remains untouched.
|