Nike+ FuelBand SE BLE Protocol Reversed. Neato – Simone writes-
I’ve completely reversed its protocol and found out the following key points:
• The authentication system is vulnerable, anyone could connect to your device.
• The protocol supports direct reading and writing of the device memory, up to 65K of contents.
• The protocol supports commands that are not supposed to be implemented in a production release (bootloader mode, device self test, etc ).
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps!
Maker Business — Limor Fried featured in NYC’s HER BIG IDEA!
Wearables — Get concrete solutions
Electronics — Probe Compensation
Biohacking — Dr. Rita Levi-Montalcini was a Centenarian Gonzo Biohacker
No comments yet.
Sorry, the comment form is closed at this time.