\section{Conclusion}
\label{sec:conclusion}

With the built eavesdropper it is proven that it is possible to intercept the communication of a reader and a tag. Determining the exact distance at which this is possible wasn't possible in this project as the oscilloscope could no longer trigger on the received signal levels. Something that can be said is that at 1.5m, it was still possible to see the forward channel on the oscilloscope and this is far enough too eavesdrop on a reader unnoticeably.

Although there were problems with the envelope detection of the signal and thus getting the UID's in a live setting was unsuccessful it is proven that it is certainly possible. 

Furthermore it's possible to mimic a tag with an emulator and with this it is possible to obtain building access at the University of Twente. So the building access based solely on the UID of an NFC card is unsafe!

A point of attention for continuing where this project ended is building a working envelope detection circuit. Alternatively this could be done digitally by sampling the modulated signal at a high enough rate. With working demodulation the decoding part can do its work.

Improvements that could be made are: building a more efficient antenna so less amplification from an amplifier is needed; building the circuit out of SMD components to reduce parasitic properties of the circuits and further filtering and amplifying the signal to increase the eavesdropping range.

Finally a disguise for the eavesdropper might be made, like a painting on the wall.