I am using the NFC 424 DNA tag and my idea is to write a password/unique identifier to the 128 Byte Propriety File (PF) using an AES Key for Read/Writes. The idea is that if the tag is "cloned" using a tag emulator it will only be able to copy the data from the Capability Container (CC) file but not the data from the PF.
Am I correct in this assumption or are there ways of reading this area of memory using custom Android/iPhone apps/3rd party hardware such as Flipper Zero multi tools.
The ultimate goal is to use an Android app to read data from the NFC tag and use the password from the PF to authenticate the tag as a genuine tag.
Many Thanks.