SparkFun Electronics Commentsurn:uuid:214d0e4e-f1b1-d287-ce26-ac5b4c9f82492024-03-28T05:31:08-06:00SparkFun ElectronicsCustomer #1673522 on Credit Card Skimmers Evolved: ShimmingCustomer #1673522urn:uuid:b07d003d-4e6b-8691-5115-dec172cbb1192021-04-21T20:39:33-06:00<p>Hey Nick I am really impressed of your work ,.can you send me the Gerber file , or the eagle file I will continue your invigatation to the bottom of it , and will tell you the results.</p>
Customer #1537670 on Credit Card Skimmers Evolved: ShimmingCustomer #1537670urn:uuid:1f21498f-12b9-ad06-abd5-c329054a48252019-11-16T15:03:28-07:00<p>FYI... what I'd do is to listen to nrf traffic for some sort of password before sending out the data dump. that makes it impossible to passively detect this device and impractible to do it actively (you don't know the pw.)</p>
Customer #1559221 on Credit Card Skimmers Evolved: ShimmingCustomer #1559221urn:uuid:743f61ec-93e8-5b13-8b6a-e26456479daf2019-11-15T12:23:56-07:00<p>If you're in the credit card stealing game, no reason you shouldn't have a list of stolen cards to use to place orders with parts distributors to avoid trace ability.</p>
Customer #1071275 on Credit Card Skimmers Evolved: ShimmingCustomer #1071275urn:uuid:769b8f1f-e47c-2cf5-c355-f5645636aacb2019-11-15T08:04:42-07:00<p>I wonder if the police can reach out to some board manufacturers with the PCB layout or partial schematic to find out if they manufactured it and who they sent it to if so. Or maybe the manufacturer or reseller of one of the specialty components. It may not be enough for a no-knock warrant, but could be used to corroborate or to narrow down the list of suspects. This is high-tech enough the carder didn't make it from scratch in his basement out of parts on-hand..</p>
Customer #193111 on Credit Card Skimmers Evolved: ShimmingCustomer #193111urn:uuid:48edf993-3914-5a4e-957b-be868c780eda2019-04-26T12:14:03-06:00<p>Are there any plans to update your skimmer app? A lot has happened in the 2 years since you've released it. Thanks!</p>
Blade on Credit Card Skimmers Evolved: ShimmingBladeurn:uuid:67f3e1c1-3c18-c95f-df1a-a5399245a7d22018-05-10T13:22:20-06:00<p>I was able to hit the play button under the large image on the link to get it to play.</p>
Rob36 on Credit Card Skimmers Evolved: ShimmingRob36urn:uuid:994f1149-c321-09c4-c008-1e4a9f1be8832018-05-08T20:41:34-06:00<p>You gave the link to listen, but I could find nowhere on that page to actually listen. It just gave info on the talk but no link to listen. I registered and still no link was given.<p>So how can we listen to that talk?</p></p>
Customer #713366 on Credit Card Skimmers Evolved: ShimmingCustomer #713366urn:uuid:afa15a2a-2196-c372-a752-b5d32e121f7e2018-05-04T11:41:08-06:00<p>The Pi 3+ Wifi was recently hacked and turned into an SDR. I think this would be a fitting application to try and capture the radios in the wild.<p>https://www.rtl-sdr.com/nexmon-sdr-using-the-wifi-chip-on-a-raspberry-pi-3b-as-a-tx-capable-sdr/</p><p>https://github.com/seemoo-lab/mobisys2018_nexmon_software_defined_radio</p></p>
unmanaged on Credit Card Skimmers Evolved: Shimmingunmanagedurn:uuid:1e8a10a8-d82f-2caa-790f-54435bed07632018-05-04T05:42:25-06:00<p>https://hackaday.com/2014/08/05/sniffing-nrf24l01-traffic-with-wireshark/<p>People getting away from Bluetooth as it is too easy to detect with OSH...</p></p>