Fixed
- MIFARE Classic Key recovery improvements: further stabilization
- Fix issue with state machine performing key reuse early (first identified in transportation cards - shared patch on PR #4048 to OFW)
OFW changes: See the release notes for 1.1.2
Under development
- MFKey 3.1: 6x faster static encrypted nonce attacks, all on your Flipper Zero
- Post 3822 refactor continued, general performance and process improvements
- Ultralight C dictionary attacks: common key attacks through the same process you'd read any other card
- Finalizing dev feature branch, public preview shared on Christmas
- Ultralight C/AES key recovery attack: Researching a new potential attack against Ultralight C which can be used to expand the Ultralight C dictionary, developing PoC app
- Tesla credential enrollment: use your Flipper as an unofficial Tesla key card
Join our Discord and help shape our cutting-edge and NFC-focused firmware.