Našel jsem článek, že v ČR se používá většinou "UID Mifare" kterou by právě tohle zařízení mělo být schopné překopírovat.
A pak se zde objevuje i varianta s těžší překonatelností "i-Class SE". Tak tipuju, že běžně i paneláků bude ta "mifare". Tak snad by to mělo fungovat?
Tohle je z popisku:
function:
high frequency:
Operating card mode:
1. Conventional M1 S50 card reader and other 14443A Class B card.
2. Use the PRNG vulnerability parsing sector 0.
3. Use nested (mfoc) vulnerability resolve the whole card.
Analog card mode:
1. Analog Mifare series S50 / Ultralight / DESFire card UID.
2. Analog M1 S50 whole sector data. (Pick a card reader)
3. Analog M1 S50 shell, to obtain data to calculate the secret key (pick a card reader)
Silent mode:
1. Silent sniffer data communication between the M1 S50 card and card reader, analytical secret key.
2. Silent sniffing 14443A Class B card reader with a complete communications data.
Reader device can be used for debugging and behavior analysis.
Low Frequency:
Operating card mode:
1. read ID, HID, T55XX, Indala and other low-frequency card.
2. By T55XX card write ID / HID / Indala, turned into three cards.
Analog card mode:
1. Enter ID / HID card, analog to the specified card type.
2. Analog modulation schemes specified data cards and ASK / FSK / PSK
Silent Mode:
1. silently sniff data between the card and the reader (less, not tested)