The NExT is a Dual-Frequency injectable implant that contains a High Frequency 13.56MHz chip (NTAG216) and a Low Frequency 100-150KHz chip (T5577)
The NTAG216 is primarily used for NDEF messaging such as URL sharing, contact cards and more.
The T5577 is a very capable multi emulator low frequency chip that can be used for cloning most types of common low frequency chips.
The NExT is NOT capable of payment.
The NTAG216 does not have a changable UID, it is not a 'magic' chip, because of this, the NTAG216 cannot be used for 1-1 cloning.
In order to use the NTAG216 for access control, the UID of the NTAG would need to be supplied to the system administrator in order to enroll that UID as a valid credential under your user profile. This is only possible if the system being used supports ISO14443A UIDs as a valid token type, not all systems are guaranteed to support enrolling just the UID, as this is a very low security token type.
NDEF (NFC Data Exchange Format) is how NFC chips communicate messages to mobile phones and other compatible readers, this is often used for sharing URLs or Contact cards to phones in order to quickly and seamlessly share social media and other information to other people.
In order to encode NDEF records onto an NTAG216, we recommend using the NFCTOOLS app available on iOS and Android.
iOS has.. special circumstances regarding NDEF messaging which you can read about below, this does not have a massive impact on usability but it is something to be aware of when choosing what to encode as NDEF.
NDEF can be overwritten freely unless a password is set, if you set a password, ensure it is written down somewhere because if you forget the password, you will not be able to overwrite the chip ever again.
You can use the ISO14443A UID of the NTAG216 in the NExT to log into your computer, you can do this via the KBR1, the KBR1 will print a decimalised version of the chip's UID into the currently selected text box, to use it to log into your computer, change the user password to the string the KBR1 outputs when scanning the chip.
We recommend not using just the KBR1 output as a password, but use it as a suffix to your normal password, thus using your implant as a basic kind of 2FA, when changing your password to a new one, type your normal password and then scan the implant.
NTAG216 Datasheet
NDEF on iOS infodoc
NDEF Introduction
KBR1,
The T5577 is a very capable mutlti-emulator chip, meaning it can be programmed to emulate a large number of low-frequency chipsets (only one at a time though!), this makes it incredibly versatile for many different access control systems that rely on lower-security chipsets.
Common chipsets that are able to be cloned to the T5577 in the NExT include but are not limited to:
HID-PROXII
EM4100/EM4102
PAC-STANLEY
FDX-B (pet chips!)
VIKING
In order to clone a low-frequency chip to the T5577 in the NExT, you can use a Proxmark or a FlipperZero. Other tools such as the Blue-Cloner exist, but we do not reccommend using these or other handheld cloners because they set a password to the chip when writing data, this password is tricky to remove and can cause problems for the chip.
You can use the T5577 in the NExT to log into your computer by using an LF Reader keyboard emulator such as the RD-60 linked below, this does the same thing as the KBR1 but for low frequency.
These low Frequeny keyboard emulators rely on the chip data encoded into the memory of the T5577 and only support a handful of common data types such as EM4100, this means if you change the data in the T5577 after setting it up to use as a PC-Login, the password it prints will not be correct, so make sure you only set up your T5577 as a PC-Login if you plan on not changing the data.