![]() started with the official Nike app for the Fuelband. ![]() found that the authentication system of the Fuelband can be easily bypassed and discovered that some low-level functions (such as arbitrarily reading and writing to memory) are completely exposed to the end user or anyone else who hacks past the authentication process. Was trying to reverse-engineer the Bluetooth protocol of his Nike+ Fuelband and made some surprising discoveries.
0 Comments
Leave a Reply. |