YouTube

Got a YouTube account?

New: enable viewer-created translations and captions on your YouTube channel!

34C3 - Doping your Fitbit

Get Embed Code
1 Language

https://media.ccc.de/c/34c3/34c3-8908-doping_your_fitbit

On Fitbit Firmware Modifications and Data Extraction

Security architectures for wearables are challenging. We take a deeper look into the widely-used Fitbit fitness trackers. The Fitbit ecosystem is interesting to analyze, because Fitbit employs security measures such as end-to-end encryption and authentication to protect user data (and the Fitbit business model). Even though this goes beyond security mechanisms offered by other fitness tracker vendors, reverse-engineering the trackers enables us to launch practical attacks against Fitbit. In our talk, we demonstrate new attacks including wireless malware flashing on trackers as well as “unlocking” the trackers to work independent from the Fitbit cloud.

jiska DanielAW

https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/8908.html