Spent some time today tearing down a "Chipolo ONE Point" and identifying debug pads.
It's a Bluetooth tag (FCC ID: 2AD85-C21M) compatible with Google's Find My Device network.
The MCU is a nRF52833 and it's programmed with APPROTECT enabled.
However the specific chip seems to be an older revision (AAA0), so it may be still vulnerable to voltage glitching attacks to bypass the debug protection lock.
I don't have a proper voltage glitching setup at home, so I guess that's all for the moment 😀
=> More informations about this toot | View the thread | More toots from lucab@fosstodon.org
text/gemini
This content has been proxied by September (3851b).