The xNT is an injectable implant that contains a High Frequency 13.56MHz chip (NTAG216) chip
The NTAG216 is primarily used for NDEF messaging such as URL sharing, contact cards and more, it cannot be used for cloning existing credentials and must be enrolled manually if you wish to use it in an access control system
The xNT is NOT capable of payment.
The NTAG216 does not have a changable UID, it is not a 'magic' chip, because of this, the NTAG216 cannot be used for 1-1 cloning.
In order to use the NTAG216 for access control, the UID of the NTAG would need to be supplied to the system administrator in order to enroll that UID as a valid credential under your user profile. This is only possible if the system being used supports ISO14443A UIDs as a valid token type, not all systems are guaranteed to support enrolling just the UID, as this is a very low security token type.
NDEF (NFC Data Exchange Format) is how NFC chips communicate messages to mobile phones and other compatible readers, this is often used for sharing URLs or Contact cards to phones in order to quickly and seamlessly share social media and other information to other people.
In order to encode NDEF records onto an NTAG216, we recommend using the NFCTOOLS app available on iOS and Android.
iOS has.. special circumstances regarding NDEF messaging which you can read about below, this does not have a massive impact on usability but it is something to be aware of when choosing what to encode as NDEF.
NDEF can be overwritten freely unless a password is set, if you set a password, ensure it is written down somewhere because if you forget the password, you will not be able to overwrite the chip ever again.
You can use the ISO14443A UID of the NTAG216 in the xNT to log into your computer, you can do this via the KBR1, the KBR1 will print a decimalised version of the chip's UID into the currently selected text box, to use it to log into your computer, change the user password to the string the KBR1 outputs when scanning the chip.
We recommend not using just the KBR1 output as a password, but use it as a suffix to your normal password, thus using your implant as a basic kind of 2FA, when changing your password to a new one, type your normal password and then scan the implant.
NTAG216 Datasheet
NDEF on iOS infodoc
NDEF Introduction
KBR1,