Unable to overwrite NFC chip

Hi,

I recently got an NFC implant in my hand (NTAG216), and cloned an Amiibo onto it. Now, I am unable to overwrite the chip in my hand. For an Amiibo to work on a Nintendo console, Nintendo requires it be in write-protected mode, which it looks like my tag has succumbed to. However, my Nintendo Switch does not recognize the implant in my hand – there is no error message or anything, it just doesn’t read it. This makes me think that the process was borked and perhaps not all is lost. Is there any way I can overwrite the data on my hand? If not fully overwrite it, can I at least still add records (custom messages) for people to see when they scan my hand? I read through https://nfc.toys and see that I can get the NFC Password for this tag, and possibly write to it, but I would like someone more knowledgeable to instruct me with what to do.

Here is the info and memory of the NFC tag on my hand:

** TagInfo scan (version 4.24.4) 2019-03-03 11:27:14 **
Report Type: External

-- IC INFO ------------------------------

# IC manufacturer:
NXP Semiconductors

# IC type:
NTAG216

-- NDEF ------------------------------

# No NDEF data storage populated:

-- EXTRA ------------------------------

# Memory size:
888 bytes user memory
* 222 pages, with 4 bytes per page

# IC detailed information:
Full product name: NT2H1611G0DUx
Capacitance: 50 pF

# Version information:
Vendor ID: NXP
Type: NTAG
Subtype: 50 pF
Major version: 1
Minor version: V0
Storage size: 888 bytes
Protocol: ISO/IEC 14443-3

# Configuration information:
ASCII mirror disabled
NFC counter: disabled
No limit on wrong password attempts
Strong load modulation enabled

# Originality check:
Signature verified with NXP public key

-- FULL SCAN ------------------------------

# Technologies supported:
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible

# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.NdefFormatable]
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms


# Detailed protocol information:
ID: 04:25:01:12:FF:38:85
ATQA: 0x4400
SAK: 0x00

# Memory content:
[00] *  04:25:01 A8 (UID0-UID2, BCC0)
[01] *  12:FF:38:85 (UID3-UID6)
[02] *  50 48 0F E0 (BCC1, INT, LOCK0-LOCK1)
[03] *  F1:10:FF:EE (OTP0-OTP3)
[04] +  03 00 FE 00 |....|
[05] +  00 00 00 00 |....|
[06] +  00 00 00 00 |....|
[07] +  00 00 00 00 |....|
[08] +  00 00 00 00 |....|
[09] +  00 00 00 00 |....|
[0A] +  00 00 00 00 |....|
[0B] +  00 00 00 00 |....|
[0C] +  00 00 00 00 |....|
[0D] *  3E D7 4C CF |>.L.|
[0E] *  F9 AB 05 3D |...=|
[0F] *  0C 3F BC 0A |.?..|
[10] .  02 E9 03 D8 |....|
[11] .  46 60 64 B2 |F`d.|
[12] .  75 42 0E B0 |uB..|
[13] .  61 B9 F6 B8 |a...|
[14] .  E0 34 35 EA |.45.|
[15] .  01 8E 00 00 |....|
[16] .  02 49 05 02 |.I..|
[17] .  0D 12 B5 11 |....|
[18] .  FB 92 06 81 |....|
[19] .  B9 3B 68 3F |.;h?|
[1A] .  7F 8B 59 8A |..Y.|
[1B] .  2B 38 54 68 |+8Th|
[1C] .  D5 FD E6 9A |....|
[1D] .  09 F7 9D 83 |....|
[1E] .  A8 C6 5D 65 |..]e|
[1F] .  DA 4F F3 BC |.O..|
[20] .  8A 1F BF 17 |....|
[21] .  30 8B F4 96 |0...|
[22] .  DA 0A CF 8B |....|
[23] .  A0 BD 7D 88 |..}.|
[24] .  F2 D1 0F 59 |...Y|
[25] .  04 3E 16 6A |.>.j|
[26] .  1B E3 65 4F |..eO|
[27] .  6C 71 A4 BA |lq..|
[28] .  62 12 FA 99 |b...|
[29] .  53 D7 40 60 |S.@`|
[2A] .  52 79 6D 7A |Rymz|
[2B] .  56 BE E2 54 |V..T|
[2C] .  02 13 8B 12 |....|
[2D] .  74 18 D5 30 |t..0|
[2E] .  F0 5C C5 02 |.\..|
[2F] .  AD 7C AC DF |.|..|
[30] .  42 B5 71 D9 |B.q.|
[31] .  12 A3 E3 DF |....|
[32] .  C6 0E CD 15 |....|
[33] .  40 15 55 FF |@.U.|
[34] .  39 DD 72 29 |9.r)|
[35] .  2C 4D 32 2C |,M2,|
[36] .  57 DB 5A ED |W.Z.|
[37] .  29 04 9B F2 |)...|
[38] .  38 BE E1 41 |8..A|
[39] .  8D E5 99 A6 |....|
[3A] .  8D 20 79 24 |. y$|
[3B] .  2A 79 61 81 |*ya.|
[3C] .  37 8D E6 9B |7...|
[3D] .  5B 2D EE E7 |[-..|
[3E] .  7A A0 FF 4A |z..J|
[3F] .  DC 2B 23 3C |.+#<|
[40] .  1E 3D E7 05 |.=..|
[41] .  09 C8 82 6F |...o|
[42] .  5A 30 7F 56 |Z0.V|
[43] .  12 F2 CC 6A |...j|
[44] .  6A 8D 4A 1B |j.J.|
[45] .  D1 E3 EF 67 |...g|
[46] .  1D 41 C2 12 |.A..|
[47] .  22 6E AF A1 |"n..|
[48] .  F1 1B 60 06 |..`.|
[49] .  36 06 44 68 |6.Dh|
[4A] .  4E C3 1F E1 |N...|
[4B] .  46 A2 72 06 |F.r.|
[4C] .  60 55 D2 39 |`U.9|
[4D] .  25 9A 13 DF |%...|
[4E] .  3E 73 5A 17 |>sZ.|
[4F] .  F6 E6 2C F5 |..,.|
[50] .  64 74 74 C8 |dtt.|
[51] .  5D E9 DE F1 |]...|
[52] .  06 8B E6 92 |....|
[53] .  7A FF BA B8 |z...|
[54] .  13 40 CF F9 |.@..|
[55] .  E4 AC F5 AF |....|
[56] .  43 4C 91 49 |CL.I|
[57] .  CF A3 36 BE |..6.|
[58] .  E1 9E 5B EB |..[.|
[59] .  05 F2 C0 0B |....|
[5A] .  5B 26 38 E8 |[&8.|
[5B] .  EB 19 2A 2C |..*,|
[5C] .  BD 7E 00 83 |.~..|
[5D] .  B8 07 DD 06 |....|
[5E] .  D7 27 32 50 |.'2P|
[5F] .  CB 2D C1 68 |.-.h|
[60] .  B6 5F 75 09 |._u.|
[61] .  C7 C9 38 DC |..8.|
[62] .  B8 F0 29 C7 |..).|
[63] .  0F 46 A6 CF |.F..|
[64] .  02 76 93 E2 |.v..|
[65] .  57 8A 09 3C |W..<|
[66] .  A0 A1 B1 C4 |....|
[67] .  B9 82 5E 2B |..^+|
[68] .  87 55 0E 5C |.U.\|
[69] .  CB 95 6E 79 |..ny|
[6A] .  97 1D B0 09 |....|
[6B] .  00 8A 28 A3 |..(.|
[6C] .  06 FF 39 EA |..9.|
[6D] .  49 74 EE B2 |It..|
[6E] .  2E 82 CC 13 |....|
[6F] .  8C D4 34 CA |..4.|
[70] .  F5 0C 54 CA |..T.|
[71] .  82 B4 AD 9D |....|
[72] .  B8 04 F7 95 |....|
[73] .  C6 14 AC 8A |....|
[74] .  FC 2B 29 09 |.+).|
[75] .  82 A2 3E 94 |..>.|
[76] .  DE 0C 93 88 |....|
[77] .  7F 03 DC B8 |....|
[78] .  8F 49 7B 97 |.I{.|
[79] .  D7 DB 64 5A |..dZ|
[7A] .  0A 0A EC DD |....|
[7B] .  46 C2 C5 24 |F..$|
[7C] .  05 F2 D2 2F |.../|
[7D] .  CB 85 36 FD |..6.|
[7E] .  4B 6F E3 8D |Ko..|
[7F] .  BE E0 57 D6 |..W.|
[80] .  70 32 17 A7 |p2..|
[81] .  37 A3 4D C4 |7.M.|
[82] .  01 00 0F 00 |....|
[83] .  00 00 00 04 |....|
[84] .  5F 00 00 00 |_...|
[85] .  9D AB 80 2F |.../|
[86] .  80 80 00 00 |....|
[87] .  00 00 00 00 |....|
[88] .  00 00 00 00 |....|
[89] .  00 00 00 00 |....|
[8A] .  00 00 00 00 |....|
[8B] .  00 00 00 00 |....|
[8C] .  00 00 00 00 |....|
[8D] .  00 00 00 00 |....|
[8E] .  00 00 00 00 |....|
[8F] .  00 00 00 00 |....|
[90] .  00 00 00 00 |....|
[91] .  00 00 00 00 |....|
[92] .  00 00 00 00 |....|
[93] .  00 00 00 00 |....|
[94] .  00 00 00 00 |....|
[95] .  00 00 00 00 |....|
[96] .  00 00 00 00 |....|
[97] .  00 00 00 00 |....|
[98] .  00 00 00 00 |....|
[99] .  00 00 00 00 |....|
[9A] .  00 00 00 00 |....|
[9B] .  00 00 00 00 |....|
[9C] .  00 00 00 00 |....|
[9D] .  00 00 00 00 |....|
[9E] .  00 00 00 00 |....|
[9F] .  00 00 00 00 |....|
[A0] .  00 00 00 00 |....|
[A1] .  00 00 00 00 |....|
[A2] .  00 00 00 00 |....|
[A3] .  00 00 00 00 |....|
[A4] .  00 00 00 00 |....|
[A5] .  00 00 00 00 |....|
[A6] .  00 00 00 00 |....|
[A7] .  00 00 00 00 |....|
[A8] .  00 00 00 00 |....|
[A9] .  00 00 00 00 |....|
[AA] .  00 00 00 00 |....|
[AB] .  00 00 00 00 |....|
[AC] .  00 00 00 00 |....|
[AD] .  00 00 00 00 |....|
[AE] .  00 00 00 00 |....|
[AF] .  00 00 00 00 |....|
[B0] .  00 00 00 00 |....|
[B1] .  00 00 00 00 |....|
[B2] .  00 00 00 00 |....|
[B3] .  00 00 00 00 |....|
[B4] .  00 00 00 00 |....|
[B5] .  00 00 00 00 |....|
[B6] .  00 00 00 00 |....|
[B7] .  00 00 00 00 |....|
[B8] .  00 00 00 00 |....|
[B9] .  00 00 00 00 |....|
[BA] .  00 00 00 00 |....|
[BB] .  00 00 00 00 |....|
[BC] .  00 00 00 00 |....|
[BD] .  00 00 00 00 |....|
[BE] .  00 00 00 00 |....|
[BF] .  00 00 00 00 |....|
[C0] .  00 00 00 00 |....|
[C1] .  00 00 00 00 |....|
[C2] .  00 00 00 00 |....|
[C3] .  00 00 00 00 |....|
[C4] .  00 00 00 00 |....|
[C5] .  00 00 00 00 |....|
[C6] .  00 00 00 00 |....|
[C7] .  00 00 00 00 |....|
[C8] .  00 00 00 00 |....|
[C9] .  00 00 00 00 |....|
[CA] .  00 00 00 00 |....|
[CB] .  00 00 00 00 |....|
[CC] .  00 00 00 00 |....|
[CD] .  00 00 00 00 |....|
[CE] .  00 00 00 00 |....|
[CF] .  00 00 00 00 |....|
[D0] .  00 00 00 00 |....|
[D1] .  00 00 00 00 |....|
[D2] .  00 00 00 00 |....|
[D3] .  00 00 00 00 |....|
[D4] .  00 00 00 00 |....|
[D5] .  00 00 00 00 |....|
[D6] .  00 00 00 00 |....|
[D7] .  00 00 00 00 |....|
[D8] .  00 00 00 00 |....|
[D9] .  00 00 00 00 |....|
[DA] .  00 00 00 00 |....|
[DB] .  00 00 00 00 |....|
[DC] .  00 00 00 00 |....|
[DD] .  00 00 00 00 |....|
[DE] .  00 00 00 00 |....|
[DF] .  00 00 00 00 |....|
[E0] .  00 00 00 00 |....|
[E1] .  00 00 00 00 |....|
[E2] .  00 00 00 BD (LOCK2-LOCK4, CHK)
[E3] .  04 00 00 FF (CFG, MIRROR, AUTH0)
[E4] .  00 05 -- -- (ACCESS)
[E5] +P FF FF FF FF (PWD0-PWD3)
[E6] +P 00 00 -- -- (PACK0-PACK1)

  *:locked & blocked, x:locked,
  +:blocked, .:un(b)locked, ?:unknown
  r:readable (write-protected),
  p:password protected, -:write-only
  P:password protected write-only

--------------------------------------



And here’s the info for the actual amiibo:

** TagInfo scan (version 4.24.4) 2019-03-03 16:51:41 **
Report Type: External

-- IC INFO ------------------------------

# IC manufacturer:
NXP Semiconductors

# IC type:
NTAG215

-- NDEF ------------------------------

# No NDEF data storage populated:

-- EXTRA ------------------------------

# Memory size:
504 bytes user memory
* 126 pages, with 4 bytes per page

# IC detailed information:
Full product name: NT2H1511G0DUx
Capacitance: 50 pF

# Version information:
Vendor ID: NXP
Type: NTAG
Subtype: 50 pF
Major version: 1
Minor version: V0
Storage size: 504 bytes
Protocol: ISO/IEC 14443-3

# Configuration information:
ASCII mirror disabled
NFC counter: protected
Wrong password attempts allowed: 7
Strong load modulation disabled
Configuration locked

# Originality check:
Signature verified with NXP public key

-- FULL SCAN ------------------------------

# Technologies supported:
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible

# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.NfcA, android.nfc.tech.MifareUltralight, android.nfc.tech.NdefFormatable]
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms


# Detailed protocol information:
ID: 04:CE:96:FA:5B:4A:80
ATQA: 0x4400
SAK: 0x00

# Memory content:
[00] *  04:CE:96 D4 (UID0-UID2, BCC0)
[01] *  FA:5B:4A:80 (UID3-UID6)
[02] *  6B 48 0F E0 (BCC1, INT, LOCK0-LOCK1)
[03] *  F1:10:FF:EE (OTP0-OTP3)
[04] +r A5 00 00 00 |....|
[05] +r 88 40 92 E6 |.@..|
[06] +r FD 35 A6 BE |.5..|
[07] +r 5E AC F5 8B |^...|
[08] +r C2 37 FF 71 |.7.q|
[09] +r 3B 87 1D AF |;...|
[0A] +r B5 EA 15 32 |...2|
[0B] +r 3F E4 BA E5 |?...|
[0C] +r D1 FD 4E 11 |..N.|
[0D] *r 7A E7 64 F3 |z.d.|
[0E] *r 09 FF F9 5B |...[|
[0F] *r E3 DD 24 78 |..$x|
[10] *r BD C9 27 4A |..'J|
[11] *r 60 04 F3 94 |`...|
[12] *r A6 6A 65 A0 |.je.|
[13] *r 86 3B 2D 2C |.;-,|
[14] *r 0E 4B CE 33 |.K.3|
[15] *r 01 8E 00 00 |....|
[16] *r 02 49 05 02 |.I..|
[17] *r 0D 12 B5 11 |....|
[18] *r FB 92 06 81 |....|
[19] *r B9 3B 68 3F |.;h?|
[1A] *r 7F 8B 59 8A |..Y.|
[1B] *r 2B 38 54 68 |+8Th|
[1C] *r D5 FD E6 9A |....|
[1D] *r 09 F7 9D 83 |....|
[1E] *r A8 C6 5D 65 |..]e|
[1F] *r DA 4F F3 BC |.O..|
[20] +r 5C 1D 4E 1F |\.N.|
[21] +r 7D 55 5B D0 |}U[.|
[22] +r EC 31 EB 29 |.1.)|
[23] +r B5 E2 DE FD |....|
[24] +r 96 E5 FA 79 |...y|
[25] +r 64 E2 E0 7A |d..z|
[26] +r 5A 41 11 36 |ZA.6|
[27] +r 3A CF C8 1C |:...|
[28] +r 18 74 CE 37 |.t.7|
[29] +r 7C 85 21 ED ||.!.|
[2A] +r CE A4 BC A0 |....|
[2B] +r 07 8E 6E 8F |..n.|
[2C] +r 5D 88 3B 30 |].;0|
[2D] +r 4B B6 B0 59 |K..Y|
[2E] +r 69 8E 37 91 |i.7.|
[2F] +r B9 AE F4 F9 |....|
[30] +r C8 50 A3 16 |.P..|
[31] +r EB 4A BB 61 |.J.a|
[32] +r 93 3E 6A 57 |.>jW|
[33] +r 4B 0F 27 F5 |K.'.|
[34] +r 1C B6 C1 53 |...S|
[35] +r A0 15 0D 6F |...o|
[36] +r 54 AB 31 28 |T.1(|
[37] +r 63 0A 43 9A |c.C.|
[38] +r A7 3E 4F 0C |.>O.|
[39] +r 31 FE 66 E8 |1.f.|
[3A] +r F8 8D 59 89 |..Y.|
[3B] +r B4 23 60 3F |.#`?|
[3C] +r 57 F6 13 4E |W..N|
[3D] +r 58 94 80 0A |X...|
[3E] +r C1 41 28 EC |.A(.|
[3F] +r A1 8E 8E D4 |....|
[40] +r 80 86 A4 50 |...P|
[41] +r 6E 60 F1 42 |n`.B|
[42] +r 7F F9 3B 66 |..;f|
[43] +r C2 3B 6A D6 |.;j.|
[44] +r A1 78 1F 20 |.x. |
[45] +r BD D2 B6 90 |....|
[46] +r B4 1A 55 38 |..U8|
[47] +r F8 EA 0D 2C |...,|
[48] +r A5 8A 18 7F |....|
[49] +r 94 03 B8 0E |....|
[4A] +r 65 83 C0 E3 |e...|
[4B] +r 92 3A D9 B5 |.:..|
[4C] +r EC FE 62 67 |..bg|
[4D] +r 7B 32 06 D6 |{2..|
[4E] +r AD 27 74 0B |.'t.|
[4F] +r A0 2E EA 01 |....|
[50] +r FD 32 04 46 |.2.F|
[51] +r 8E D8 38 60 |..8`|
[52] +r 4E CF 38 4C |N.8L|
[53] +r 28 86 E4 9D |(...|
[54] +r CC F0 EE 99 |....|
[55] +r 27 C5 AA 6D |'..m|
[56] +r FA E3 16 18 |....|
[57] +r 6E 52 14 32 |nR.2|
[58] +r AE 90 34 28 |..4(|
[59] +r 81 6F 18 21 |.o.!|
[5A] +r 5A DF A1 DF |Z...|
[5B] +r 0A 8F 91 3B |...;|
[5C] +r 9D 11 82 BB |....|
[5D] +r 0E FC 1F FA |....|
[5E] +r E7 DE 22 2E |..".|
[5F] +r F3 4F 61 5A |.OaZ|
[60] +r C6 B3 3F 50 |..?P|
[61] +r B2 74 91 78 |.t.x|
[62] +r 6E AF F9 74 |n..t|
[63] +r 6F 68 1C 4B |oh.K|
[64] +r 3E C7 91 14 |>...|
[65] +r 55 B4 9A EC |U...|
[66] +r CE 04 FE DE |....|
[67] +r 22 50 63 A4 |"Pc.|
[68] +r 2D DF A2 11 |-...|
[69] +r A1 E6 90 54 |...T|
[6A] +r B8 68 1C 43 |.h.C|
[6B] +r 17 2F EE 2B |./.+|
[6C] +r BB 59 BF 6F |.Y.o|
[6D] +r A2 B8 11 80 |....|
[6E] +r C7 C7 F7 39 |...9|
[6F] +r A0 02 11 9D |....|
[70] +r E1 03 93 17 |....|
[71] +r 89 F3 49 04 |..I.|
[72] +r 0D ED E2 68 |...h|
[73] +r 92 C7 33 7B |..3{|
[74] +r AB 0A 39 5F |..9_|
[75] +r A8 E3 15 C6 |....|
[76] +r 96 CB 21 98 |..!.|
[77] +r AA B3 74 00 |..t.|
[78] +r 1E BF 09 C3 |....|
[79] +r 2F 06 B6 CF |/...|
[7A] +r BF AA E1 D3 |....|
[7B] +r C2 8F 2E 0F |....|
[7C] +r 1C B4 8E D1 |....|
[7D] +r 55 1E E0 00 |U...|
[7E] +r AD 06 1C 41 |...A|
[7F] +r D5 1D 73 FF |..s.|
[80] +r D6 7F 9B C1 |....|
[81] +r 6C 54 4A 69 |lTJi|
[82] *r 01 00 0F BD (LOCK2-LOCK4, CHK)
[83] *r 00 00 00 04 (CFG, MIRROR, AUTH0)
[84] *r 5F 00 -- -- (ACCESS)
[85] +P XX XX XX XX (PWD0-PWD3)
[86] +P XX XX -- -- (PACK0-PACK1)

  *:locked & blocked, x:locked,
  +:blocked, .:un(b)locked, ?:unknown
  r:readable (write-protected),
  p:password protected, -:write-only
  P:password protected write-only

--------------------------------------

I’m a complete novice with NFC, so I realize I probably screwed up big time. Sadly, I only stumbled onto the Dangerous NFC app after this all went down. It was a great learning experience, but I truly feel bummed out that the implant I got 24 hours ago is now unusable. I’m still holding out hope that not all is lost! Any and all advice would be appreciated!

1 Like

Hey there… sorry to say your chip is toast now.

The first challenge is that Nintendo uses different ntag2xx chips… I can’t remember which but I think it’s ntag215 which has slightly less memory. The ntag series also supports a version command so if they are really adamant that people not use unofficial tags with the system, the first thing they will check is that the tag is responding properly to the version command.

Next they change the CC (capability container) stored in page 03 to something custome, which blows away the NFC standard required CC values… so now your tag is not longer NFC compliant.

Finally they lock the static lock bits which handles tag data locking from page 03 to 10, and they are locked now.

In short the cloning process shredded your xNT chip and would never have worked anyway. Unfortunately you’ll have to remove and replace it if you want full functionality back. At this point you could still use it with things like Samsung door locks and other applications that only make use of the UID of the chip.

3 Likes

Hi Amal,

Ahh, that was my fear. On the bright side, this experience led to me conducting an exhaustive amount of research that I otherwise would not have performed. I’ll likely get the tag removed in the next week or so, and get another implant at the next security convention I attend. It’d be cool to keep the borked tag in my wallet, and setup a Raspberry Pi project that turns on my lights when I scan the wallet, or something along those lines.

Thank you so much for the quick, honest, and courteous response! Can’t wait for the next implant :sunglasses:

2 Likes

I’ve copies of amiibo and others NFC related items from various games. I wish you had asked the forum before engaging in experimentation.

My personal recommendation would be to have a small stack of tags for experimentation and don’t use implants when you’re engaged in testing. As Amal mentioned Amiibo tags are NTAG215, best to always use the standards deployed with a specific technology.

1 Like

I noticed the password is set on the scan as well… do you know if they use it or if it just set for fun by Nintendo?

1 Like

The password is stored in a set of files. I could help them make their tag usable again, but I’d need to know which amiibo they attempted to clone. Obviously the locked & blocked bits are unchangeable.

I’ll message you with additional information which is restricted from distribution.

1 Like

Hi Connor,

Thank you so much for responding!
I scanned the Resetti amiibo (there’s some irony here, I know). Its UID according to TagMo is 018E000002490502.

Feel free to move this conversation to DM’ing if necessary. Let’s fix this bad boy.

sent you a PM

1 Like

How did it go? Did you get it unbricked?

1 Like

Hi James,

Connor is in the process of looking into it. I’ll post here as soon as we’ve got a solution.

1 Like

Nice nice. Let us known as I do worry it looks permabricked

Hey buddy :slight_smile:

Just checking in wondering how it went?

1 Like

@ConnorGoodwolf

Thanks for checking in! Still waiting to hear back from Connor; he’s been pretty busy lately.