Hacker News new | past | comments | ask | show | jobs | submit login

I was hoping to intercept and reverse-engineer the protocol of the Oura rings.

For some reason, I thought this kind of device would attract a lot of hackers given the platform capabilities but I could not f8nd any other documented attempt except the really thorough iFixit (destructive) teardown : https://www.ifixit.com/Teardown/Oura+Ring+2+Teardown/135207




I know the device uses BLE - I'd start with seeing if there is any data included in the BLE broadcast




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: