(i wouldn’t be me if i didn’t ‘uhm akshully’ wherever possible, love you, amal)
Gen2 detection does exist but compared to Gen1 detection, it’s WAY less commonplace across the access control market; it’s like a blue lobster, if you catch my drift (please, someone catch my drift with that reference)
Gen2 Detection does however, tend to be more… fatal. in the few times I and my equally hyperfixated friends have come across it, if detected the reader tends to send out a bad block 0 write in order to brick the chip, which is unrecoverable on gen2 a lot of the time.
However comma
This minor potentiality is not a reason to shy away from gen2, it is up to you as the researcher to establish any magic-issues before using your implant as a credential. a test card of the same chip should always be your first attempt when cloning and if you follow that as a law, you’ll never face an accidentally bricked gen2.
Also, a shoutout to gen2
A big big important feature of gen2’s is that they’re near universally immune to SAK swapping see here for more details which is a HUGE rising issue with domestic MFC cloning in the modern day since its advent a few years ago.
and thus concludes another classic equip tirade regarding a minor point someone raised in a passing comment, sorry.