I am using the NFC 424 DNA tag and my idea is to write a password/unique identifier to the 128 Byte Propriety File (PF) using an AES Key for Read/Writes. The idea is that if the tag is "cloned" using a tag emulator it will only be able to copy the data from the Capability Container (CC) file but not the data from the PF.
Am I correct in this assumption or are there ways of reading this area of memory using custom Android/iPhone apps/3rd party hardware such as Flipper Zero multi tools.
The ultimate goal is to use an Android app to read data from the NFC tag and use the password from the PF to authenticate the tag as a genuine tag.
Many Thanks.
Hello @KJD101
For tracking purposes, an in order to keep only one channel of communication, we will continue the communication in your internal ticket.
Regards,
Eduardo.