Hacker News new | past | comments | ask | show | jobs | submit

Using your Apple device as an access card in unsupported systems

https://github.com/kormax/apple-device-as-access-card
Note that this article is 2 years old, and therefore predates iOS 18.1, which allows applications to directly access the NFC hardware: https://developer.apple.com/support/nfc-se-platform/
This is cool, do love the hacking ingenuity. And not that I want to give Apple extra credit, but they are slowly opening up NFC: https://www.macrumors.com/guide/apple-nfc-chip-ios-18-1/ - Is is very restrictive (probably) and very late - most certainly. But at least it's slowly coming.
loading story #42768522
loading story #42764286
loading story #42760697
Oh and I only have to give my identity to Alipay and Chinese transit? And modify my phone so it consistently beacons out a trackable ID?
loading story #42764374
loading story #42762675
loading story #42764689
That information could come in handy, cool.

A complementary method is to attach a writable NFC sticker tag to the phone. Though it has to be placed far enough from the phone's NFC antenna in order for both/either to work.

The upside is that you get a second tag of your choice (physically) on your phone. There are even UID-writable sticker tags out there (even if they can be a tiny bit harder to find).

You also don't need to replace your default transit card, which could be inconvenient depending on where you live.

I’m curious what the security of these NFC lock systems looks like. (I’m talking about the commercial building systems mentioned like Brivo and Unifi, not home systems.)

In particular, I know unifi cards rotate keys. So you can’t simply clone them with a Flipper, and this also means third party cards don’t work. By default, this is true, but you can’t simply clone turn it off, as mentioned in the article.

Does this mean that the other systems’ cards are easily cloned? This seems very insecure, if so.

loading story #42761901
loading story #42761207
loading story #42764490
loading story #42762410
I wonder why the Chinese transit card uses an unsecure method. Sounds like that is a lone outlier case so presumably intentional for some reason?
loading story #42761667
loading story #42761523
this is cool but the limitations make it almost unusable
loading story #42764573
should have a (2023) tag based on commits
Does this work with ANY card set as the transit card in iOS? Or just this one type of transit card?
loading story #42760576
loading story #42762105
Love seeing the Xiamen City Metro card! Would recognize the scenery from anywhere
there's not technology problem, just because Apple grant NFC privilege to Alipay and local partner in China
loading story #42764480
> 1. Install the AliPay app

> 2. Register inside the AliPay app

How about no.

loading story #42764403
I was really excited about the new UniFi G3 access card reader claiming support for iPhone unlock until I realized it's $5/year/device. It just seems like a slow boil into subscriptions for a company whose entire value prop is prosumer networking without the contracts.

I don't know if it's Apple or UniFi to blame for this fee, but it turned me off entirely of what would have been a day 1 purchase. Other, cheaper junky IoT home locks support Apple HomeKit for unlocking for free, why can't UniFi figure it out?

Really glad to see hacking in this space.

loading story #42760019
loading story #42759909
loading story #42760850
loading story #42760880
loading story #42760740
Or ... maybe we should take a step back and stop trying to shove everything into phones - like drivers license or all forms of payment.
loading story #42760968
loading story #42760736
Would be cool to get into the office like this. We have RFID tags.