We don't take the money up front. We're authorizing cards as a minimal low pass filter. Primarily we need to know how many to make (or if anyone wanted one at all!)
I should have added a smiley face or a little more text.
The question was actually intended a bit differently than I realize you (and others) may have interpreted.
It is VERY clear from your site that you are NOT charging anyone until you ship the product they are buying. Hence the "non-Kickstarter Kickstarter" comment. In other words, you are not doing anything like Kickstarter at all yet you are gathering commitments and gauging interest.
I shouldn't have left it open to interpretation. Sorry.
FYI I downloaded your app a couple months ago with the hopes I could use it to replicate my NFC card for my building, but I hit your login-only screen.
Can you make an a "Lockitron Labs" app or something similar that allows you to read third party NFC keys and replicate their signal on demand?
Actual NFC keys (as implemented on NFC phones) don't work like this -- they are much more secure (think of an exchange of freshly calculated encrypted information rather than broadcasting an unchanging code) and can't be copied.
Wouldn't it be possible to reverse engineer then? If you ping it with several different signals, you can interpret the responses and analyze the encryption - right?
This would be an incredible feature. Unfortunately, even within NFC the range of standards and encryption types across card types means you can't consistently do this.
Our NFC implementation is really the reverse of this - rather than beaming a code, you are reading an NFC tag to trigger your app to send the command.