Sorry I don’t know coding that well; this the output:
[usb] pm3 --> lf search
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[=] Couldn't identify a chipset
[usb] pm3 --> lf t5 det
[!] Could not detect modulation automatically. Try setting it manually with 'lf t55xx config'
[usb] pm3 --> auto
[=] lf search
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[=] Couldn't identify a chipset
[=] hf search
[!] No known/supported 13.56 MHz tags found
[=] lf search - unknown
[=] --> trying ( 125.00 kHz )
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[=] Couldn't identify a chipset
[=] --> trying ( 134.83 kHz )
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[=] Couldn't identify a chipset
[=] --> trying ( 250.00 kHz )
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[=] Couldn't identify a chipset
[=] --> trying ( 375.00 kHz )
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[=] Couldn't identify a chipset
[=] --> trying ( 500.00 kHz )
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[=] Couldn't identify a chipset
[=] Failed both LF / HF SEARCH,
[=] Trying `lf read` and save a trace for you
[#] LF Sampling config
[#] [q] divisor............. 95 ( 125.00 kHz )
[#] [b] bits per sample..... 8
[#] [d] decimation.......... 1
[#] [a] averaging........... yes
[#] [t] trigger threshold... 0
[#] [s] samples to skip..... 0
[#]
[+] saved 40000 bytes to PM3 file
WHAT IS WRONG WITH YOU?
Why did you look at the picture I told you not to look at?
You’re one of those people that slow down to look at an accident aren’t you???
Well, now you have come this far, you can actually read the next bit, it is actually accurate
END OF EDIT
Also make sure you PM3 is not sitting on a conductive surface.
My bad it’s on non conductive surface, I missed type earlier.
I did try lf tune command and place it on the sweet spot but still getting the same error, I don’t think it’s the placement of fob on lf antenna, for some reason pm3 can’t recognize pyramid chip, or maybe I’m looking in the wrong command (ref. to lf search).
Are we sure they are LF? Could put an RDC up to the reader to check frequency. Anyone shine a light through the silicone looking encapsulation of that purple fob?
@Pilgrimsmaster We should probably move that piece of information into a FAQ or wiki or something. Really call it out as a pyramid/anytime fitness fob copy method.
Not really. The demod data is not recognized format so it’s hard to tell. However if the fob has a code written on it and you posted that and the data then it might be possible to decide at least some of the raw data.