The Blue Cloner is back, new and improved!

Curious on this too, would like to have one that doesn’t set a password at all!

Its up on the site and the description says it still sets a password.
The Blue Cloner will write the source ID to your T5577 based product, then set a password after writing. This protects the target T5577 chip from other malicious writers, but it also means your target chip requires a password to write data to it again. This does not affect the Blue Cloner – it will continue to function properly – but if you wish to write to your T5577 chip using any other writer, you will need to ensure the writer can authenticate first using the password 51243648.

1 Like

I hate devices that try to be too clever. Here the password thing is exceptionally stupid, because either it’s secret and you’re locked out of your chip after the cloner is done writing, or it’s public (as is the case here) and it’s just a minor extra annoyance if you’re a maker of “malicious writers”.

1 Like

Holy fuck, how did I miss that???

  • Maybe because it was right at the bottom and I got distracted by the purdy YouTube video above it ?

  • Maybe I thought it was just an artifact leftover from the previous webstore listing?

  • Maybe I just became one of “those people” who just ask instead of trying to find the info themselves?

Eitherway, to atone for my sins and make amends, hopefully I can reduce the shame I have brought on my family.

Here is the command line
lf t55xx write b 0 d ******** p 51243648

Now, I shall step outside and commit sepuku.

tenor (27)

4 Likes

Just cloned my work badge to my NExT.
It works.
Awesome, only thing left is to replace 1 lock…

4 Likes

I’m assuming this is the command line you’d find if you were to write to the chip with a blue cloner then read it with a PM3… for the purpose of deleting it and thus removing the password? Sorry for the confusion, I’m pretty new to all of the RFID programming stuff :sweat_smile:

Follow-up question, if you intend to only use the blue cloner and not upgrade or switch cloning/writing devices, what harm does the password do, even if it’s viewable as was mentioned earlier?

That’s the command you would use on a proxmark to write a new ID to an xEM or the LF side of the NExT if you had already written to it with a blue cloner which had password protected it. You would have to issue the command like that every time you wanted to write a new ID.

It doesn’t do any harm, as long as you always use a blue cloner that has that specific password and you’re needs are addressed by the limited tag brands that a blue cloner supports (HID or EM). Lots of implantees want more than that, though. For example, my workplace uses a different type of LF system. The blue cloner wouldn’t work for me, and testing it out could lock my implant down so that I have to buy a proxmark, or get it removed. That’s not even considering the data tearing issues that the poor antenna coupling can cause.

1 Like

Oh God, that sounds scary. I’m about to attempt to clone my school ID (HID 125kHz) to my NExT chip using a blue cloner and I actually just created a thread asking about how to identify the compatibility of the cloner with my card given the only info I have on it (markings on the back)… really hoping I don’t brick the chip, wondering if you would know how to differentiate? Only thing I’ve confirmed is that they are HID and 125kHz.

I think a very minimal 3D print could protect your antenna without compromising range. You could even leave the “vertical” portion exposed through the wall without compromising the structure of the print to much

The antenna doesn’t need much protection. It’s really quite stiff. I only made the plexiglass frame thingy to mount it securely to the frame, but you could hot-glue the hell out of the inner part and it would end up just as solid, or very nearly so.

I would be much more interested in the blue cloner if the password function could be disabled

Surely someone who’s good with the hardware and firmware stuff could jail break it?

I am hoping the Flipper Zero will do this function, we won’t know until next year. but fingers crossed, then I can leave my proxmark on the shelf until I need diagnostic functions.

Flipper more expensive than a blue cloner but cheaper than a Proxmark.
But for the potential ease of use and convenience, I think it will be worth it

1 Like

Yessssss. I hope that campaign lives up to what they have advertised. Very excited to receive that

Antennas will be the biggest “issue” , but time will tell

The password is on purpose. It is is in fact the configuration bits needed to tune a T5577 to the DT mind control field. The blue cloner is Amal’s innocent-looking trojan horse to subvert non-DT implants and integrate their wearers into the collective.

Why is that? Presumably if you had a proxmark3 then the password isn’t an issue, because it’s known… and if you have the blue cloner because you don’t have a proxmark3, then the password isn’t an issue either because the blue cloner knows the password and you can continue cloning IDs to your t5577.

The only scenario I can think of where the password would be a hindrance would be if you had a blue cloner and also a different cloner with its own password and wanted to use them interchangeably… but then why have two cloners but not a proxmark3?

2 Likes

I have a proxmark3 easy, which isn’t exactly the easiest to position for a good x series read/write
I know about the custom antenna, but I don’t think I’m in a good place to build that yet

The blue cloner (with mod) looks much easier, but dealing with the password if I were to use the proxmark adds hassle

Also there just the principle of “don’t do stuff I didn’t tell you to do”

Is there somewhere someone can direct me as a freshie to learn about these card types and the distinctions between them? I’m very interested in learning just no clue where to start. When I Google the card names it comes up mostly purchase stuff not much info stuff

Not really a succinct explanation no, but basically they are all “LF” or low frequency RFID chips that can operate at 125khz - 134khz, depending on the tuning. Each are similar but have slightly different data encoding methods or analog front end characteristics … but they basically do the same thing as any RFID transponder - report an ID or serial number. To dig into the exact details, you will have to get at data sheets… but the short simple answer is they do the same job just do it slightly differently. Luckily, the T5577 chip can emulate all of them by changing how it works and thus, how it appears to the reader interrogating it.

3 Likes

Google the specific card type followed by data sheet
Ex: T5557 RFID CARD DATA SHEET

This will bring you up something eventually haha

1 Like