Just got my NExT implanted last week and have been having a blast setting it all up.
For the HF side of the chip, I am storing some encrypted backup text and would ideally like to make the implant read only, with a password required to overwrite the data. This would basically be a sanity check to avoid me accidentally overwriting the data unintentionally.
I found this thread Can my xNT be easily set to read-only? - #2 by amal referencing the xNT and I believe I have figured out the default password on the NExT, however, when I try and send the second and 3rd lines of hex I just receive an NAK response. Below is what I am sending and receiving:
TX: 1B xx xx xx xx
RX: 0000
TX: A2 E3 04 00 00 04
RX: NAK
TX: A2 E4 00 00 00 00
RX: NAK
When I send an intentionally invalid password, I receive an ‘NAK’ on line 1 as well, so I believe this means the password is correct.
Thanks for the suggestion, using the DNGR password results in the first line coming back ‘NAK’ which is what I have observed when using a deliberately invalid password
You sounds like you know what you are doing; but better safe than sorry, so just a little reminder for you, just be very careful when using shell commands, it is easy to get your implant all kinds of fucked up if you make a mistake with your command
Yup NExT is what I am using when I get a ‘0000’ response on the first line.
Interestingly, using the article that you linked I was able to successfully change the password, but still unable to set the lock bits using the A2E300000004 string
For sure! Initial experiments I’ve actually done on an unimplemented sacrificial NxT which works without issue with the above commands, just seems odd that the NExT seems to have different behavior
Hmm uh oh. Page E3 has a config byte of FF… I have to review my notes but pretty sure that includes a config lock bit which has been set… therefore you cannot change the configuration at all.