January 30, 2015 AT 5:11 am

Nike+ FuelBand SE BLE Protocol Reversed


Nike+ FuelBand SE BLE Protocol Reversed. Neato – Simone writes-

I’ve completely reversed its protocol and found out the following key points:
• The authentication system is vulnerable, anyone could connect to your device.
• The protocol supports direct reading and writing of the device memory, up to 65K of contents.
• The protocol supports commands that are not supposed to be implemented in a production release (bootloader mode, device self test, etc ).

Check out all the Circuit Playground Episodes! Our new kid’s show and subscribe!

Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.

Join us every Wednesday night at 8pm ET for Ask an Engineer!

Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground”Adafruit’s Apps!

Maker Business — Transforming Today’s Bad Jobs into Tomorrow’s Good Jobs

Wearables — Snap a picture

Electronics — To Y5V or not to Y5V?

Biohacking — Quantified Bob’s Experience with Ketone Esters

Get the only spam-free daily newsletter about wearables, running a "maker business", electronic tips and more! Subscribe at AdafruitDaily.com !

No Comments

No comments yet.

Sorry, the comment form is closed at this time.