[Noisebridge-discuss] X-10 hardware hacking
travis+ml-noisebridge at subspacefield.org
travis+ml-noisebridge at subspacefield.org
Fri Jun 11 04:30:09 UTC 2010
Actually, the wireline protocol is well documented, but the security
modules have a different protocol to prevent people from using COTS
X10 units from triggering or disabling the alarm.
Based on what I read, it seems like the wireless security devices (and
key fob) generate some kind of ID at startup, and get paired with the
console via a special switch ("install mode").
I hadn't considered that they might use a commodity chipset and one
could use it to hack the protocol. That has some interesting
implications, some good, some bad.
--
A Weapon of Mass Construction
My emails do not have attachments; it's a digital signature that your mail
program doesn't understand. | http://www.subspacefield.org/~travis/
If you are a spammer, please email john at subspacefield.org to get blacklisted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.noisebridge.net/pipermail/noisebridge-discuss/attachments/20100610/c1dc12d3/attachment-0003.sig>
More information about the Noisebridge-discuss
mailing list