[Noisebridge-discuss] X-10 hardware hacking

travis+ml-noisebridge at subspacefield.org travis+ml-noisebridge at subspacefield.org
Fri Jun 11 04:30:09 UTC 2010


Actually, the wireline protocol is well documented, but the security
modules have a different protocol to prevent people from using COTS
X10 units from triggering or disabling the alarm.

Based on what I read, it seems like the wireless security devices (and
key fob) generate some kind of ID at startup, and get paired with the
console via a special switch ("install mode").

I hadn't considered that they might use a commodity chipset and one
could use it to hack the protocol.  That has some interesting
implications, some good, some bad.
-- 
A Weapon of Mass Construction
My emails do not have attachments; it's a digital signature that your mail
program doesn't understand. | http://www.subspacefield.org/~travis/ 
If you are a spammer, please email john at subspacefield.org to get blacklisted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.noisebridge.net/pipermail/noisebridge-discuss/attachments/20100610/c1dc12d3/attachment-0003.sig>


More information about the Noisebridge-discuss mailing list