New to biohacking

In simple terms, the xEM is a T5577 chip that can emulate various other common 125khz chips like EM41xx, HID ProxCard II, and Indala… maybe others. It’s a very versatile chip. Chips in the 125khz frequency typically only have an ID number and no further application data or storage… the applications are simple and typically not secured either.

The xNT is a 13.56mhz ISO14443A standard compliant RFID tag which is also NFC Type 2 compliant… so it can be used with many ISO14443A RFID systems and be read by NFC devices (NFC enabled smartphones for example) as well. It has a UID (unique ID) and also some memory storage and other features that are typically used by NFC applications to store NDEF data (vCard data, URL links, etc.)

Actually no, the problem is not with the cloner. The problem has to do with “tearing” and could present itself with any cloner. Read this thread for more info; https://forum.dangerousthings.com/t/quirks-of-the-t5577-cloning-tags-to-the-xem

Yes many cloners set a passcode. We posted our cloners passcode on the product page.

No idea… I have no data on the TCC Presto Card, and if they are anything like most other transit cards, it’s probably not possible to clone it. Some transit systems still use insecure chips, but most have moved to secure chips because, well, we’re talking about money and if there is a security flaw in the money card people are using, people will steal rides guaranteed… so again, most transit companies have moved to secure chips like the DESFire EV1.

1 Like