xNT NFC Chip
- 13.56MHz ISO14443A & NFC Type 2 chip
- 2x12mm cylindrical sterile bioglass implant
$69.00 – $127.82
WARNING This kit definitely contains dangerous things. While the xNT chip has undergone several quality checks during manufacture and has been put through a battery of tests, it has not been certified by any government regulatory agency for implantation or use inside the human body. Use of this device is strictly at your own risk.
The xNT NFC chip implant was designed by Dangerous Things and production of it was originally crowdfunded via an Indiegogo campaign in 2013. It works with NFC enabled smartphones, certain commercial access control systems, and USB contactless ISO14443A readers.
Important Things To Know
Please expand the sections below to read up on things like performance expectations, return policy, installation procedure, etc.
- 13.56MHz ISO14443A & NFC Type 2 compliant NTAG216 RFID chipset
- Full datasheet for the NXP NTAG216 RFID/NFC chip
- 7 byte UID and 886 bytes of user read/write memory
- 10 year data retention. Rated for 100k writes per memory block.
- Encased in 2.1mm by 12mm bioglass with non-toxic epoxy
- Pre-tested and pre-loaded into sterile injection assembly
- No “anti-migration” coating means easy removal/replacement
Our x-series chips come pre-loaded inside injector systems with steel needles and cannot typically be read while inside the needle. Because of this, we perform a full test on every x-series tag before it is loaded into the injector assembly and sterilized. We have also conducted several tests on our x-series chips and cataloged those tests here.
We offer a 30-day money back guarantee! Read all about it on our return policy page.
If you do purchase one of our products and experience a failure, we offer a full lifetime warranty on all of our products. You will need to return the product for testing and analysis, and if it is malfunctioning, we will ship you a replacement free of charge. Read all about it on our warranty policy page.
Unfortunately, most reader devices, including mobile phones, typically have antennas designed with thin PCB traces made into blocky rectangular shapes that lay along a flat plane. These antenna designs are great for coupling with and reading large flat labels and access cards which also share this antenna shape, but they have a hard time coupling to the very small cylindrical antenna coil inside our x-series chips. Most mobile phones and reader devices have a “sweet spot” or two that must be located and used each time to get consistent results. Other devices, such as the Samsung Ezon electronic deadbolt lock, sometimes use wire wound coil antenna loops inside, which work much more reliably with small glass transponders like our x-series chips. You should not expect your USB reader or mobile device to achieve the same read range with our x-series chips that you normally get with a label tag or card style tag. Here are some example videos detailing typical read performance and how to find that “sweet spot”.
The xLED can help! The xLED is a diagnostic device that mimics the x-series antenna coil winding and shows you the best possible location and rotation/orientation for holding your x-series transponder up to any reader. That’s why we include it in our deluxe bundle!
Achieving a safe installation definitely requires a steady hand and experience performing aseptic procedures. Dangerous Things prefers our customers locate one of our professional body piercing or body modification partners to complete the installation of this product. If no partners are available in your area, you should be able to follow this guide to finding a professional in your area who is willing to assist you. For aftercare information and what to expect, please read our X-Series FAQ page.
In addition to lock bytes, the NTAG216 offers a 32bit password protection function. Regardless of what some NFC smartphone apps indicate, it is not possible to remove or disable the password. It is only possible to set the password to the default value of FF FF FF FF. If the password is set to the default value, then anyone could easily authenticate, change the password, then write data or change protection options for your tag, and either permanently lock the tag or just change the password to some unknown value. Because it is also possible to protect memory blocks from unauthenticated reads using a password, this could make the tag completely useless by not allowing any memory blocks to even be read.
Finally, many of the critical configuration bytes used by the NTAG216 chip are stored in the last few memory pages of the tag. This means that it may be possible for an NFC application that does not properly detect or honor the xNT’s memory schema to accidentally attempt to write NDEF record data (the data you’re trying to store on the tag) overtop of the configuration bytes. For example, if the data you are attempting to write is longer than the user memory blocks available, the remainder of the data might be written overtop of configuration bytes, which contain settings that are potentially dangerous to modify such as the config lock byte. The configuration lock byte is not possible to disable, so accidentally writing to that byte could result in your configuration being irreversibly locked.
To help our customers protect their tag from accidental modification or malicious attack, we have developed Dangerous NFC for Android. Our DNFC app allows customers to secure their tag by doing the following things;
- Disable lock bytes so they cannot be used to lock any memory blocks as read-only
- Update the password block with a custom, non-default password value
- Update the memory protection option to write-only protection
- Update the memory protection range to protect the configuration bytes
This approach allows the entire user memory space to be written to/updated, while at the same time protecting the configuration bytes and password values at the bottom end of the xNT memory space. This means an application cannot accidentally write data unintentionally to any configuration bytes. It also means the password of the xNT cannot be updated without first authenticating. This means you will need the current password in order to update or change the password. Without updating the dynamic memory protection range, it would technically be possible to just write a new password without first knowing the old password.
Ultimately, once secured by Dangerous NFC, you are free to use any other NFC app to write data to the tag and not need to be afraid of accidentally locking the tag, or changing the configuration bytes, or someone maliciously locking your tag or changing your password. We suggest using NXP’s TagWriter app.