I was hoping to intercept and reverse-engineer the protocol of the Oura rings.
For some reason, I thought this kind of device would attract a lot of hackers given the platform capabilities but I could not f8nd any other documented attempt except the really thorough iFixit (destructive) teardown : https://www.ifixit.com/Teardown/Oura+Ring+2+Teardown/135207
For some reason, I thought this kind of device would attract a lot of hackers given the platform capabilities but I could not f8nd any other documented attempt except the really thorough iFixit (destructive) teardown : https://www.ifixit.com/Teardown/Oura+Ring+2+Teardown/135207