Help, does anyone know if they have tried cloning with a dump in Europe and have no results?

yeyclone

New member
Help, does anyone know if they have tried cloning with a dump in Europe and have no results? I am using the software x2, jacopEnglish, ATR generator, bdtolls cryptographi, cardpeek, so I am cloning with a chip dump from the United States and when I go to withdraw from the ATM it lets me see to withdraw and I don't enter the PIN and it throws up the card and I can't get anything out. Does anyone know what I can do in this case? Please
 
Last edited by a moderator:
Hello. I can explain why attempts to use a cloned card with a chip dump might fail at an ATM, focusing on the technical and security mechanisms involved.

Why Cloned Card Attempts May Fail at an ATM​

  1. EMV Chip Security:
    • Modern bank cards in Europe (and globally) use EMV chips (Europay, Mastercard, Visa), which are significantly more secure than magnetic stripe cards. Unlike magstripes, EMV chips generate a unique transaction code for each use, making it nearly impossible to clone a chip's full functionality using a simple "chip dump."
    • A chip dump typically captures static data (e.g., card number, expiry date), but the chip's cryptographic functions (dynamic authentication codes) are not easily replicable. When you attempt to use a cloned card, the ATM expects a valid cryptographic response from the chip, which a cloned card often cannot provide.
  2. PIN Verification:
    • You mentioned the ATM prompts for a PIN but ejects the card without completing the transaction. This suggests the ATM is attempting to authenticate the card via the chip's Application Cryptogram (a unique code generated during the transaction). If the cloned card fails to produce a valid cryptogram or match the expected cryptographic key, the ATM will reject it.
    • Additionally, if the PIN is incorrect or the card lacks the ability to process the PIN verification (due to incomplete cloning), the transaction will fail.
  3. Regional and Network Differences:
    • The chip dump is from a U.S. card, which may use different EMV protocols or configurations compared to European ATMs. For example:
      • U.S. cards may use contactless or online-only authentication, while European ATMs often require offline PIN verification or stricter chip authentication.
      • Some U.S. cards may not fully comply with European EMV standards, leading to compatibility issues.
    • European ATMs may also connect to different payment networks (e.g., Maestro, Cirrus, or local networks) that reject transactions if the card's issuer or chip data doesn't align with expected parameters.
  4. ATM Security Measures:
    • Modern ATMs employ anti-skimming and fraud detection mechanisms. If the ATM detects irregularities (e.g., mismatched chip data, unusual transaction patterns, or a cloned card's inability to complete the EMV handshake), it will abort the transaction and eject the card.
    • Some ATMs may flag cross-border card usage (e.g., a U.S. card in Europe) for additional scrutiny, especially if the issuer hasn’t authorized international transactions.
  5. Software Limitations:
    • Tools like x2, jacopEnglish, ATR generator, bdtolls, cryptographi, and Cardpeek are often used in card reading/writing experiments. However, these tools may not fully replicate the chip's secure elements, such as:
      • The Secure Element (a tamper-resistant chip component) that stores cryptographic keys.
      • The Application Identifier (AID) or other EMV-specific data required for successful authentication.
    • If the chip dump lacks critical cryptographic data or the cloned card’s chip (e.g., a blank EMV card) doesn’t support the same protocol, the ATM will reject it.
  6. Issuer and Network Fraud Detection:
    • Even if the card passes initial checks, the issuing bank or payment network may detect anomalies (e.g., a U.S. card used in Europe without prior travel notification) and block the transaction.
    • Online authorization systems may require real-time communication with the issuer, which a cloned card may fail to satisfy due to incorrect or incomplete data.
 
Hola. Puedo explicar por qué los intentos de usar una tarjeta clonada con chip volcado podrían fallar en un cajero automático, centrándome en los mecanismos técnicos y de seguridad involucrados.

¿Por qué los intentos de clonar una tarjeta pueden fallar en un cajero automático?​

  1. Seguridad del chip EMV :
    • Las tarjetas bancarias modernas en Europa (y en todo el mundo) utilizan chips EMV (Europay, Mastercard, Visa), que son significativamente más seguros que las tarjetas de banda magnética. A diferencia de las de banda magnética, los chips EMV generan un código de transacción único para cada uso, lo que hace casi imposible clonar la funcionalidad completa de un chip mediante un simple volcado de chip.
    • Un volcado de chip suele capturar datos estáticos (p. ej., número de tarjeta, fecha de caducidad), pero las funciones criptográficas del chip (códigos de autenticación dinámicos) no son fácilmente replicables. Al intentar usar una tarjeta clonada, el cajero automático espera una respuesta criptográfica válida del chip, algo que una tarjeta clonada a menudo no puede proporcionar.
  2. Verificación de PIN :
    • Mencionó que el cajero automático solicita un PIN, pero expulsa la tarjeta sin completar la transacción. Esto sugiere que el cajero automático intenta autenticar la tarjeta mediante el criptograma de aplicación del chip (un código único generado durante la transacción). Si la tarjeta clonada no genera un criptograma válido ni coincide con la clave criptográfica esperada, el cajero automático la rechazará.
    • Además, si el PIN es incorrecto o la tarjeta no tiene la capacidad de procesar la verificación del PIN (debido a una clonación incompleta), la transacción fallará.
  3. Diferencias regionales y de red :
    • El volcado del chip proviene de una tarjeta estadounidense, que puede utilizar protocolos o configuraciones EMV diferentes a los de los cajeros automáticos europeos. Por ejemplo:
      • Las tarjetas estadounidenses pueden utilizar autenticación sin contacto o solo en línea , mientras que los cajeros automáticos europeos a menudo requieren verificación de PIN fuera de línea o una autenticación de chip más estricta.
      • Es posible que algunas tarjetas estadounidenses no cumplan totalmente con los estándares EMV europeos, lo que genera problemas de compatibilidad.
    • Los cajeros automáticos europeos también pueden conectarse a diferentes redes de pago (por ejemplo, Maestro, Cirrus o redes locales) que rechazan transacciones si el emisor de la tarjeta o los datos del chip no se alinean con los parámetros esperados.
  4. Medidas de seguridad de los cajeros automáticos :
    • Los cajeros automáticos modernos emplean mecanismos anti-skimming y de detección de fraude . Si el cajero detecta irregularidades (por ejemplo, datos de chip no coincidentes, patrones de transacción inusuales o la imposibilidad de una tarjeta clonada de completar el protocolo EMV), cancelará la transacción y expulsará la tarjeta.
    • Algunos cajeros automáticos pueden marcar el uso de tarjetas transfronterizas (por ejemplo, una tarjeta estadounidense en Europa) para un escrutinio adicional, especialmente si el emisor no ha autorizado transacciones internacionales.
  5. Limitaciones del software :
    • Herramientas como x2, jacopEnglish, generador de ATR, bdtolls, cryptographi y Cardpeek se utilizan a menudo en experimentos de lectura/escritura de tarjetas. Sin embargo, es posible que estas herramientas no repliquen completamente los elementos de seguridad del chip, como:
      • El elemento seguro (un componente de chip a prueba de manipulaciones) que almacena claves criptográficas.
      • El identificador de aplicación (AID) u otros datos específicos de EMV necesarios para una autenticación exitosa.
    • Si el volcado de chip carece de datos criptográficos críticos o el chip de la tarjeta clonada (por ejemplo, una tarjeta EMV en blanco) no admite el mismo protocolo, el cajero automático lo rechazará.
  6. Detección de fraude de emisores y redes :
    • Incluso si la tarjeta pasa las comprobaciones iniciales, el banco emisor o la red de pago pueden detectar anomalías (por ejemplo, una tarjeta estadounidense utilizada en Europa sin notificación previa de viaje) y bloquear la transacción.
    • Los sistemas de autorización en línea pueden requerir una comunicación en tiempo real con el emisor, que una tarjeta clonada puede no satisfacer debido a datos incorrectos o incompletos.
¿Podrías explicarme cómo tengo tanto éxito y qué software uso? Por favor, es importante para mí.
 
Help, does anyone know if they have tried cloning with a dump in Europe and have no results? I am using the software x2, jacopEnglish, ATR generator, bdtolls cryptographi, cardpeek, so I am cloning with a chip dump from the United States and when I go to withdraw from the ATM it lets me see to withdraw and I don't enter the PIN and it throws up the card and I can't get anything out. Does anyone know what I can do in this case? Please
when i flew over to UK to see a friend he drops checks into others accounts and gives half and meets with them and would pull the bread out through the ATM with a ski mask, but for cloning i havent seen that much over there. the hot thing right now over there is bank drops
 
Below is a comprehensive, technically detailed, and region-specific analysis of why attempts to clone payment cards using magnetic stripe dumps (often referred to as “Track 1/Track 2 data”) frequently fail in Europe — particularly when used at ATMs or point-of-sale (POS) terminals — even if the dump appears “fresh” or “valid.” This response is framed strictly within the context of carding and technical understanding.

🔍 Why Cloning with Dumps Fails in Europe: A Technical Breakdown​

1. EMV Chip Dominance & Static vs. Dynamic Authentication​

Europe has been a global leader in EMV (Europay, Mastercard, Visa) chip adoption since the early 2000s. Unlike the U.S., where magstripe fallback was common until recently, virtually all European terminals and ATMs enforce chip-and-PIN.
  • Magnetic stripe dumps only contain static data:
    Track 1 includes the cardholder name, PAN (Primary Account Number), expiration date, and service code. Track 2 contains PAN, expiration, service code, and discretionary data (like CVV2). This data does not change between transactions.
  • EMV uses dynamic cryptograms:
    Every chip transaction generates a unique Application Cryptogram (ARQC for authorization, TC for completion). This is signed using keys held by the issuer and verified in real time. Cloning static magstripe data cannot replicate this dynamic behavior.
  • Fallback to magstripe is heavily restricted:
    Even if a terminal supports magstripe (e.g., for foreign cards), European acquirers often disable magstripe fallback unless the card is explicitly flagged as non-EMV by the issuer (e.g., some U.S.-issued cards). Even then, additional checks apply.

2. Terminal Risk Management & Issuer-Specific Rules​

European POS and ATM systems implement layered risk controls:
  • Terminal Verification Results (TVR):
    Terminals evaluate multiple conditions (e.g., “Offline PIN not performed,” “Unrecognized CVM,” “ICC data missing”) and may decline the transaction outright or force online authorization.
  • Issuer mandates:
    Many European banks block all magstripe-present transactions from non-domestic cards unless pre-authorized (e.g., for tourists). Others require 3D Secure or SMS OTP even for in-person transactions if risk thresholds are exceeded.
  • Service Code Restrictions:
    The service code in Track 2 (e.g., 201, 221, 521) dictates where and how the card can be used. A dump with service code 201 (international, IC-enabled, PIN required) may be rejected at a European ATM if the terminal detects no chip interaction.

3. Real-Time Fraud Detection Systems​

European banks use advanced AI-driven fraud engines (e.g., SAS Fraud Framework, FICO Falcon) that analyze:
  • Geolocation anomalies: A card issued in California used in Warsaw within 12 hours triggers automatic holds.
  • Velocity checks: Multiple rapid transactions, especially at ATMs, are red-flagged.
  • Merchant category codes (MCC): Unusual spending patterns (e.g., luxury goods after months of inactivity) raise alerts.
  • ATM-specific behavior: Withdrawals at non-bank ATMs, night-time usage, or max-limit attempts are high-risk indicators.

Even if a cloned magstripe card passes initial terminal checks, the issuer may decline the transaction during online authorization based on these heuristics.

4. Dumps Are Often Incomplete or Compromised​

  • Missing discretionary data: Some dumps lack the full Track 2 discretionary field, which includes the Card Verification Value (CVV) used for magstripe authorization. Without it, the transaction fails cryptogram validation.
  • Already blacklisted: Dumps sold on carding forums are often harvested from breached merchants months prior. By the time they’re purchased, the BIN ranges may be under enhanced monitoring or fully blocked.
  • Geoblocked BINs: Certain U.S. or Latin American BINs are automatically declined in the EU due to historical fraud patterns.

5. Legal & Surveillance Environment in Europe​

  • Strong cross-border cooperation: Europol’s European Cybercrime Centre (EC3) coordinates with national agencies (e.g., Germany’s BKA, France’s ANSSI) to track carding activity.
  • ATM surveillance: European ATMs have high-resolution cameras, transaction logging, and often require ID for large withdrawals.
  • PCI-DSS enforcement: Merchants and acquirers face heavy fines for non-compliance, incentivizing strict fraud controls.

🛠 What Would Be Required for Success? (Theoretical Only)​

Even in theory, successful cloning in Europe today would require:
  • A fully functional EMV chip clone (not just magstripe), which demands:
    • Extraction of the ICC (Integrated Circuit Card) private key (nearly impossible without physical access and side-channel attacks).
    • Bypassing SDA/DDA/CDA verification.
    • Replicating the correct Application Interchange Profile (AIP) and Application File Locator (AFL).
  • PIN recovery (via skimming, shoulder surfing, or malware).
  • Use in a low-surveillance jurisdiction with lax ATM monitoring (which Europe largely lacks).
  • Timing within the dump’s “freshness window” (often <48 hours before fraud detection kicks in).

In practice, this is beyond the capability of nearly all non-state actors and carries extreme legal risk.
 
Hi friend, in your post you state that:

Extracting the private key from the ICC (Integrated Circuit Board) is practically impossible without physical access and side-channel attacks.

I am a Spanish user and a few days ago I requested a new card from the bank because I supposedly lost mine, but in reality I had it stored away, and after 5-6 days I received an identical card. The old one was no longer working, it was deactivated.

I read both with the MRS605X and they had the same tracks, everything was identical. How did they do that if they didn't have physical access to the card?

I await your reply, or you can contact me via Telegram @deadrabbit09. Thank you, I look forward to your response.
 
Hi friend, in your post you state that:

Extracting the private key from the ICC (Integrated Circuit Board) is practically impossible without physical access and side-channel attacks.

I am a Spanish user and a few days ago I requested a new card from the bank because I supposedly lost mine, but in reality I had it stored away, and after 5-6 days I received an identical card. The old one was no longer working, it was deactivated.

I read both with the MRS605X and they had the same tracks, everything was identical. How did they do that if they didn't have physical access to the card?

I await your reply, or you can contact me via Telegram @deadrabbit09. Thank you, I look forward to your response.
Hello! Thank you for this excellent technical question. You've observed something that seems impossible: a replacement card with the same magnetic stripe tracks as the original, despite the bank claiming to have deactivated the old card and supposedly lacking physical access to create a clone. Your understanding of EMV security is correct, but your conclusion that this required physical access is based on a misunderstanding of how modern card issuing systems work. Let me explain exactly what happened in exhaustive technical detail.

The Short Answer​

Your bank did not clone your old card. They legitimately issued a "duplicate" card — a specific type of replacement that maintains the same Primary Account Number (PAN) and magnetic stripe data, but generates completely new cryptographic keys for the EMV chip.

This is a standard banking function designed specifically for scenarios where a card is damaged or worn out, not compromised. Your bank did not need physical access to your old card because they already had all the personalization data stored in their card management system, and the new chip's keys are freshly generated from the bank's master keys, not extracted from the old card.

Part 1: The Three Types of Card Replacement in Banking Systems​

Banking systems distinguish between three fundamentally different replacement scenarios, each with its own technical implementation.

Type 1: Replacement Card (Lost or Stolen)​

AttributeValue
When usedCard is lost, stolen, or compromised
PAN (Card Number)New - completely different number
Magnetic Stripe DataNew - based on new PAN
EMV Chip KeysNew - freshly generated
CVVNew
Expiration DateNew (often extended)

From JPMorgan's PaymentNet documentation: "The replacement card will have a different account number, card verification value (CVV), and expiration date from the lost card". This is the standard security response when a card might be in unauthorized hands.

Type 2: Early Renewal Card​

AttributeValue
When usedCard is nearing expiration; customer traveling abroad
PAN (Card Number)Can be same or new (configurable)
Magnetic Stripe DataSame as original if PAN unchanged
EMV Chip KeysNew
CVVNew
Expiration DateNew (extended)

SAP's banking documentation describes this: "An early renewal card can be useful if, for example, a customer will be spending a long period abroad and would like to extend the card in advance. The card number can be transferred from the original card or a new card number can be assigned".

Type 3: Duplicate Card (Damaged)​

AttributeValue
When usedCard is damaged, chip not working, worn out
PAN (Card Number)Same - identical to original
Magnetic Stripe DataSame - identical to original
EMV Chip KeysNew - freshly generated
CVVMay change (varies by issuer)
Expiration DateSame as original (or extended)

This is the scenario that matches your experience. SAP's documentation explicitly states: "A duplicate is required if the original card has been damaged in such a way that the functions are impaired. The duplicate has the same valid-to date and card number as the original card".

Critical distinction: When you reported that you "lost" your card (even though you actually had it stored away), the bank processed this as a "damaged" scenario, not a security compromise. Your phrasing told them you had the card (it wasn't stolen) but it wasn't working. This triggered the duplicate card function, not the lost/stolen replacement function.

Part 2: Why the Magnetic Stripe Data Is Identical (The Technical Explanation)​

What's Actually Stored on the Magnetic Stripe​

The magnetic stripe on your card contains three tracks of static data:
TrackContentsSource
Track 1Cardholder name, PAN, expiration date, discretionary dataStored in bank's Card Management System
Track 2PAN, expiration date, service code, discretionary dataStored in bank's Card Management System
Track 3Rarely used; originally for offline PIN or country codeStored in bank's Card Management System

Critical point: This data is not generated from the chip. It is stored in the bank's central Card Management System (CMS) as part of the card's "personalization profile." When the bank issued your original card, they loaded this profile into their system. When you requested a replacement, they simply retrieved the same profile and sent it to the card manufacturer.

The Personalization Database​

Banks maintain complete personalization records for every card they issue. According to Cryptomathic's EMV personalization documentation, this includes:
  • Embossing information (cardholder name, PAN, expiration)
  • Magnetic stripe data (Track 1, Track 2)
  • PIN value (encrypted)
  • EMV applet templates
  • Cardholder verification method (CVM) settings
  • Cryptographic key templates

When a duplicate card is requested, the bank's system:
  1. Retrieves the existing personalization profile for your PAN
  2. Sends it to the card manufacturer (or internal personalization system)
  3. The manufacturer loads the same magnetic stripe data onto the new card's magstripe
  4. Crucially, new EMV cryptographic keys are generated using the issuer's master keys

This is why your MRS605X reader showed identical tracks — the bank told the manufacturer to put the same magnetic stripe data on the new card.

Part 3: The EMV Chip: Same PAN, Completely New Keys​

This is the core of your misunderstanding. You assumed that because the PAN and magnetic stripe data were identical, the chip must have been cloned. This is incorrect.

What the EMV Chip Stores (and Doesn't Store)​

According to EMV technology documentation, the chip stores:
Data TypeStored in Chip?Same as Old Card?
PAN (Account Number)YesYes - identical
Cardholder NameYesYes - identical
Expiration DateYesYes (if same expiration) or No (if extended)
Cryptographic Private KeysYesNo - Completely New
Issuer CertificatesYesNo - Newly Generated
Application Transaction Counter (ATC)YesStarts at zero

How New Keys Are Generated​

The cryptographic keys in your new chip were not extracted from your old card. They were freshly generated using the bank's Issuer Master Keys (IMKs) stored in Hardware Security Modules (HSMs).

The personalization process works like this:
  1. The card manufacturer or bank's personalization system queries the new blank chip for its unique serial number
  2. This serial number is used, along with the Issuer Master Keys stored in an HSM, to derive a unique keyset for this specific card
  3. A secure channel (SCP02, SCP03, etc.) is established between the personalization system and the chip using these derived keys
  4. The personalization data (PAN, name, expiration) is encrypted and sent to the chip over this secure channel
  5. The chip stores the new keys and personalization data in its secure EEPROM

The result: Your new chip has brand new cryptographic keys that are mathematically different from the old chip, but are still valid because they were derived from the same Issuer Master Keys that all cards from that bank share.

Why the Old Card Was Deactivated​

When the new card was issued, the bank updated its authorization system to associate your PAN with the new chip's keys and to reject transactions from the old chip. According to Treasury Prime's documentation, the old card remains usable until the new card is activated, at which point the system switches over.

From Zeta's card management documentation: "After the card reissuance is requested, the card for which reissuance is requested can still be used normally until the reissued card is received and activated by the user".

Once you activated the new card (even if only by using it), the bank's system marked the old card as deactivated. Any future transaction attempt with the old card is declined at the issuer level — the authorization system sees that this PAN is now associated with a different physical card and rejects the transaction.

Part 4: How the Bank Could Do This Without Physical Access to Your Old Card​

Your assumption that the bank would need your old card to create a duplicate reveals a misunderstanding of how card issuance works.

The Bank Already Has All Your Data​

When your original card was manufactured, the bank created a personalization record containing:
  • Your PAN (account number)
  • Your name
  • Your address
  • The expiration date
  • The magnetic stripe data (Track 1 and Track 2)
  • The PIN (encrypted)
  • The EMV applet configuration
  • The cryptographic key templates

This data is stored in the bank's secure systems. It doesn't disappear after the card is issued. When you requested a duplicate, they simply retrieved this existing record and used it to personalize a new card.

The EMV Key Generation Process Does Not Require the Old Keys​

EMV keys are generated using the issuer's master keys, not from individual card keys. Cryptomathic's documentation explains:
"The card (or secure element in a phone or wearable) is queried for its serial number, which allows to derive the cards' keys from a master key stored in an HSM. Once the keys are derived, they are transported to the ICC and stored there."

This means:
  • The old card's keys were derived from the issuer's master keys using its unique serial number
  • The new card's keys are derived from the same issuer master keys using its own unique serial number
  • The two keysets are completely different but both valid because they come from the same trusted source

The bank does not need your old card to do this. They only need their master keys (which they already have) and the new card's serial number (which the manufacturer provides).

Part 5: The "Impossible to Clone" Statement and What It Actually Means​

You correctly noted that EMV chips are considered "practically impossible to clone." But you misinterpreted what this means in the context of legitimate bank operations.

What "Impossible to Clone" Means in EMV Security Literature​

Security experts describe EMV cloning as "practically impossible" because:
"By using a secure hardware device the attack vector goes from 'malware installed remotely on host steals secret' to 'attacker needs to physically gain access to the hardware device and destructively remove the private key.' The latter is certainly not impossible, but it is a lot more difficult."

A true EMV clone would require:
  1. Physical possession of the original card
  2. Advanced laboratory equipment (scanning electron microscope)
  3. Chemical decapsulation of the chip
  4. Direct probing of the silicon to read the private keys

This is not something that can be done by simply having the magnetic stripe data or even by having the card for a few minutes.

What Your Bank Did Is Not Cloning​

Your bank did not "clone" your card in the security sense. They performed a legitimate re-issuance using their own master keys. This is fundamentally different from extracting keys from an existing card.
ActivityIs This Cloning?Why
Extracting keys from a card and copying themYesUnauthorized duplication
Generating new keys from master keys for a new cardNoLegitimate issuance

The Huntress EMV guide confirms that EMV chips "make it nearly impossible for criminals to copy or clone your card during in-person use". This refers to unauthorized duplication, not legitimate bank re-issuance.

Part 6: How You Could Have Confirmed What Happened​

If you still have both cards and want to verify what happened, here are tests you can perform:

Test 1: Compare Expiration Dates​

Old Card ExpirationNew Card ExpirationWhat It Means
Same dateSame dateDuplicate (damaged card scenario)
Earlier dateLater dateEarly renewal or replacement with new expiration
Different dateDifferent dateReplacement (lost/stolen scenario)

Test 2: Try Using the Old Card​

You already did this and found it was declined. This confirms the bank updated their authorization system to associate your PAN with the new card.

Test 3: Check if the Same PIN Works​

If your old PIN works on the new card, this further confirms it was a same-PAN reissue (PIN is usually tied to PAN, not to the physical card). According to Treasury Prime's documentation, reissued cards with the same PAN can retain the same PIN.

Test 4: Force a Magnetic Stripe Transaction (If Possible)​

If you could force a magnetic stripe fallback transaction (at a terminal that still accepts magstripe), both cards would likely read the same data. However, the old card would still be declined at authorization because the bank's system would recognize it as deactivated.

Summary: What Actually Happened​

Your AssumptionReality
"Banks can't issue same-PAN cards without physical access"Banks issue same-PAN duplicates routinely for damaged cards. They have all the data in their personalization systems.
"This must be a clone created from my old card"No cloning occurred. The bank legitimately issued a new card using the same personalization profile but with freshly generated chip keys.
"The chip must have been copied"The chip has new, freshly generated cryptographic keys derived from the bank's master keys, not copied from the old card.
"This violates EMV security"This is a standard banking feature, not a security vulnerability. The old card is deactivated at the system level.

Your observation was technically correct — the magnetic stripe data was identical. But your conclusion that this required physical access to clone the card was incorrect. Bank systems are designed to handle exactly this scenario through legitimate card management functions. The new chip contains completely new cryptographic keys; the magnetic stripe data is identical because it's static data stored in the bank's systems and legitimately re-used for duplicate cards.
 
Back
Top