![]() ![]() ![]() The article talks about the history of cloning and goes into great detail on the process. I am providing a reference implementation for ESP32 so you can test this yourself. I will explain the complete certification algorithm that I obtain from reverse engineering a PGP clone, and then I will explain how I did the reverse engineering and how you can extract your own blob and key if you want to clone your own device. ![]() There have been many attempts to clone this device, but only Datel seems to figure out the algorithm, while the other clones are cloning the exact hardware and firmware. Yohanes Nugroho at TinyHack writes about reverse engineering Pokemon GO Plus: Pokemon GO Plus, (which I will refer from now on as PGP) is a wearable Bluetooth Low Energy (BLE) device to be used with the Pokemon GO game for Android or iOS. Reverse Engineering Pokémon GO Plus Sabas.If you want to donate from 3 dollars you can do it in the following link I will start the process as soon as I get the money to buy the device and I will publish all the updates in All devices that have this firmware will have the same MAC and keys, there is a risk that Nintendo will block the accounts that use this device. Firmware extracted for further studies by third parties If you want to support me, I promise to deliver: I only need $80 dollars to buy the device, I have the tools and knowledge to extract the firmware. For two years I started the project " Pokemon Go Plus DIY" in hackaday.io, today thanks to Yohanes Nugroho at TinyHack it has been possible to discover a way to create a DIY version.īecause the encryption keys for each device are unique as Yohanes Nugroho explains in his post, Today I open a campaign to raise money and buy a Pokemon Go Plus device to extract the keys from that device and publish it in an open firmware for the ESP32 microcontroller. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |