I really should stress one thing: like I explained in my original post, my goal was to turn my one-shot long-range Chinese-made readers into repeating readers. Reprogramming my foot implant with 2 UIDs did exactly that for $0. So as far as I’m concerned, job done.
Now I can go ahead with my butt implant project, and order a couple more of them readers to stick in my chair and in my sofa (which, incidentally, I scored the last two RS232 versions of available anywhere in Europe this afternoon. Yeah!)
I only tested with other readers for the sake of completeness before posting the hack. It works - at least with my readers - but it wasn’t my original purpose, so YMMV.
When you push the envelope of anything, even when you stay entirely within the specs, interesting things invariably happen. That’s the fun of hacking it reveals the assumptions whoever coded the other end applied to their technical implementations.
Yeah it reads - whatever it reads - and doesn’t crash apparently. I don’t know what it would clone though, and I’m not about to find out, as I have no intention of spending time repairing a perfectly okay T5577 card for the sake of finding out what a cloner I never use does when I never clone a tag.
Some science: if you’re have a dual EM, you have a Proxmark3 and you’re knowledgeable enough to hand-program a T5577 with it. So why on God’s green Earth would you use a blue cloner to copy it?
Yeah, sure enough! It’s an app in the RFID folder. It allows you to write up to three keys from your list of saved tags. My mind’s been blown learning about this multi-tag process and it’s nice to see that there’s another way to pull it off. Edit: I guess with the new keyring multi-tags that have hit the store recently, you could use this method to have a truly ludicrous number of LF tags handy. (Just good luck keeping track of which tag is written where!)