DRAFT: A Summary of Nintendo Amiibo (NFC Tag) Reverse-Engineering
I was hoping this community could help proof-check this draft blog post and:
1) help me correct anything wrong
2) let me know about any missing information (I'd love to know more about how exactly the encryption scheme was uncovered, how the master keys were extracted, etc)
3) make sure I give due credit to the right people
Thanks,
Kevin
P.S. I purposefully made a simplified Amiibo byte structure as this blog post isn't so much as a definitive reference for Amiibo hacking, but a broader overview for casual tech readers. But perhaps I should add more details at the end?
]]>