-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Reverse Engineering Android Apps


Posted by Rianne Schestowitz on Jul 21, 2023


Murena Fairphone 4 is now available in the USA ?? – with deGoogled and privacy-safe /e/OS

Introducing Ubuntu’s new HPC community team


↺ Application in connecting state


Reverse engineering in general is a tricky business and sometimes not very orthodox. So, why bother to write this article?


Well, sometimes reverse engineering is also for something good. It started when my wife dusted off her watch. We had a huge unpleasant surprise when we found that the companion app is not available anymore on Google Play! The watch is completely useless without the companion app, as you can’t even set the time on it… Because I hate to throw away a perfectly working watch I decided to create an app for it myself.


My first instinct was to find an older phone with the app still alive and to use a BLE sniffer to reverse engineer the BLE protocol. But I didn’t find the application installed on any old phones. I found the application online but the application cannot be used anymore as it was using some online services which are offline now…


Next obvious step was to decompile the application to get the communication protocol and also the algorithms behind the sleep & activities. This is how our story begins ;-).


Read on


↺ Read on




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Fri Jun 14 06:42:40 2024