Difference between revisions of "PineTime Bluetooth"
Jump to navigation
Jump to search
(Created page with " This page is under construction, but aims to get you more familiar with Bluetooth and how the PineTime utilizes it == External references == * Uncovering Privacy Leakage in...") |
(added category) |
||
(6 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
This page is under construction, but aims to get you more familiar with Bluetooth and how the PineTime utilizes it | This page is under construction, but aims to get you more familiar with Bluetooth and how the PineTime utilizes it | ||
== PineTime Bluetooth LE agreements == | |||
These are aimed for firmware developers primarily, and should describe how to design your firmware to be interoperable with the rest. | |||
* [[Firmware versioning for companion apps]] | |||
== External references == | == External references == | ||
* Uncovering Privacy Leakage in BLE Network Traffic of | * Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers - http://phpathak.com/files/hotmobile-fitness.pdf | ||
Wearable Fitness Trackers - http://phpathak.com/files/hotmobile-fitness.pdf | |||
* Protecting Privacy of BLE Device Users - https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_fawaz.pdf | * Protecting Privacy of BLE Device Users - https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_fawaz.pdf | ||
* Bluetooth: With Low Energy Comes Low Security - https://www.usenix.org/conference/woot13/workshop-program/presentation/ryan | |||
* Introduction to Bluetooth Low Energy development - https://devzone.nordicsemi.com/nordic/short-range-guides/b/getting-started/posts/introduction-to-bluetooth-low-energy-and-ble-devel | |||
[[Category:PineTime]] |
Latest revision as of 19:58, 17 October 2020
This page is under construction, but aims to get you more familiar with Bluetooth and how the PineTime utilizes it
PineTime Bluetooth LE agreements
These are aimed for firmware developers primarily, and should describe how to design your firmware to be interoperable with the rest.
External references
- Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers - http://phpathak.com/files/hotmobile-fitness.pdf
- Protecting Privacy of BLE Device Users - https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_fawaz.pdf
- Bluetooth: With Low Energy Comes Low Security - https://www.usenix.org/conference/woot13/workshop-program/presentation/ryan
- Introduction to Bluetooth Low Energy development - https://devzone.nordicsemi.com/nordic/short-range-guides/b/getting-started/posts/introduction-to-bluetooth-low-energy-and-ble-devel