Mathieu Moreau
Mathieu Moreau
Just make your tag/phone believe it's stolen (see above), find the broadcast msg with 2sec period in nRF on android, based on strongest signal, then try to replay it with...
Broadcasting constantly from android is not reliable os will kill it eventually. It's considers itself stolen/away when disconnected from BLE/wifi for ~30mins. (e.g. left in the park)
After reverse engineering the apple tag report protocol it should be possible, the question is it authenticated or anonym.
Hm this seems like a 64bit exe, try compiling with -m32 for compatibility. Need a few days to get 64bit pc.
Couldn't find any "get started" info in read me so I tried a simple empty main() function. ccsm.exe main.c C:\Users\ext\Desktop\ccsm>ccsm.exe main.c LLVM ERROR: Could not auto-detect compilation database for file...
Works great, here is my experience with it: Hard to do metrics on one C file at a time: ccsm.exe -disable-global -disable-function -disable-method main.c -- here I would need to...
Yeah I've integrated many software into tool chains and tried out most free metric tools. My suggestion is to set priorities between tasks, it is realy easy to get lost...
I managed to transfer from legacy 1xx to bc1xx segwit, but other way around gives error on local node: WARNING:root:Error in RPC call: {'code': -22, 'message': 'TX decode failed. Make...
Sorry for the delay, actually I've been using LSA every since, works great on paragraphs, the key is to set the correct number of sentences, e.g not hard code to...
I found this: When you pair an AirTag with an Apple ID, your computer and the AirTag agree on a cryptographic “seed”. This is used to generate a random data...