Nike+iPod reverse engineering (protocol too)

Posted on Sunday, October 16th, 2011 in hacks, reversed, wireless by the machinegeek

Dmitry Grinberg informs us of his latest project reverse engineering the Nike + iPod protocol. Basically this is a wireless protocol used by Nike to communicate data from certain shoe products to programs running on an iPod or iPhone. He says: “Nike+iPod is a very interesting piece of hardware for all kinds of reasons, not the least of which is that it is actually useful. It works by wirelessly transmitting data from a sensor (that is stored in your shoe) to a receiver that is either externally connected to your iPod or to the receiver that is integrated into the Bluetooth chip in the iPhone (3GS and 4 only).

I took a few days to figure out how it all works, and I am happy to say that I’ve decoded the entire packet payload successfully.”

This is a cool hack! It’s well documented and demonstrates the analytical process involved in reversing hardware. Dmitry has the C source available on his website.

Via the contact form.

This entry was posted on Sunday, October 16th, 2011 at 2:03 pm and is filed under hacks, reversed, wireless. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • KH: Using an alkaline coin cell down to 1.0V or under is a very bad idea anyway, unless you as the designer or manufacturer don't care...
  • KH: Farnell says TS1001 is no longer stocked. Not on RS. Digikey says it's obsolete. That said, there are a lot of nanoamp-class parts on sale...
  • Peter: Sunday--
  • Chris Brightly: Best of luck to all, including the wayward prototypers yet to post!
  • Wolfi: o/