The xNT is a “factory” ntag216 chip with no changes… or some may have a text record written on for testing… but the rest of the config bytes are unchanged from factory. We released the Dangerous NFC app to help protect the NTAG216 against accidental or malicious configuration changes… but when it came time to release the NExT, we went ahead and programmed the NTAG216 in the factory to protect the configuration pages and disable lock bytes… so it will be basically impossible to accidentally brick the NExT’s NTAG216 chip.