Nike+ FuelBand SE BLE Protocol Reversed. Neato – Simone writes-
I’ve completely reversed its protocol and found out the following key points:
• The authentication system is vulnerable, anyone could connect to your device.
• The protocol supports direct reading and writing of the device memory, up to 65K of contents.
• The protocol supports commands that are not supposed to be implemented in a production release (bootloader mode, device self test, etc ).
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps!
Maker Business — MakerBot’s technology of the future grapples with its rocky past
Wearables — Glue thoughts
Electronics — Check out this shorthand shortcut
Biohacking — Take a Tour of the Alcor Cryonics Facility
No comments yet.
Sorry, the comment form is closed at this time.