{"guid":"import-c39609eaa4f8ce253f","title":"A Hacker's Toolkit for RFID Emulation and Jamming","subtitle":null,"slug":"23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1597.en.html","description":"Radio Frequency Identification (RFID) tags are remotely-powered data carriers, that are often touted as a \"computer of the future\", bringing intelligence to our homes and offices, optimizing our supply chains, and keeping a watchful eye on our pets, livestock, and kids.\n","original_language":"eng","persons":["Melanie Rieback"],"tags":["23c3"," Hacking"],"view_count":251,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-01-21T08:15:08.421+01:00","length":3922,"duration":3922,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-c39609eaa4f8ce253f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-c39609eaa4f8ce253f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming","url":"https://api.media.ccc.de/public/events/import-c39609eaa4f8ce253f","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":2},{"event_id":30,"event_guid":"import-26f964c4d0bd0d0add","weight":2},{"event_id":118,"event_guid":"import-1f4121511842b31d10","weight":2},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":2},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":2},{"event_id":987,"event_guid":"import-d06544991d5aea8d3c","weight":2},{"event_id":1053,"event_guid":"import-6809edc70e003b4ece","weight":6},{"event_id":1056,"event_guid":"import-c515ec9dc323e5bdd3","weight":2},{"event_id":1067,"event_guid":"import-3c00fc2cd16ed6e9f9","weight":2},{"event_id":1114,"event_guid":"import-18f66a038ddc2f30c7","weight":2},{"event_id":1509,"event_guid":"import-31d801b8dfc62fa380","weight":3},{"event_id":1713,"event_guid":"import-4f8250d931be212cab","weight":2},{"event_id":1815,"event_guid":"UukuTtIII9uGXGpeCCgKvg","weight":6},{"event_id":1980,"event_guid":"05u2_WazMrfvEJ8KqmwsXA","weight":2},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":2}],"recordings":[{"size":253,"length":3922,"mime_type":"audio/mpeg","language":"eng","filename":"23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":640,"height":480,"updated_at":"2014-05-10T15:26:39.174+02:00","recording_url":"https://cdn.media.ccc.de/congress/2006/audio/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.mp3","url":"https://api.media.ccc.de/public/recordings/1837","event_url":"https://api.media.ccc.de/public/events/import-c39609eaa4f8ce253f","conference_url":"https://api.media.ccc.de/public/conferences/23c3"},{"size":253,"length":3922,"mime_type":"video/mp4","language":"eng","filename":"23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.m4v","state":"downloaded","folder":"video","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:21.007+01:00","recording_url":"https://cdn.media.ccc.de/congress/2006/video/23C3-1597-en-hackers_toolkit_for_rfid_emulation_and_jamming.m4v","url":"https://api.media.ccc.de/public/recordings/1836","event_url":"https://api.media.ccc.de/public/events/import-c39609eaa4f8ce253f","conference_url":"https://api.media.ccc.de/public/conferences/23c3"}]}