Home / Series / Chaos Communication Congress / Aired Order / Season 34 / Episode 45

Doping your Fitbit

Speakers: jiska, DanielAW Firmware modifications faking you fitter tSecurity architectures for wearables are challenging. We take a deeper look into the widely-used Fitbit fitness trackers. The Fitbit ecosystem is interesting to analyze, because Fitbit employs security measures such as end-to-end encryption and authentication to protect user data (and the Fitbit business model). Even though this goes beyond security mechanisms offered by other fitness tracker vendors, reverse-engineering the trackers enables us to launch practical attacks against Fitbit. In our talk, we demonstrate new attacks including wireless malware flashing on trackers as well as “unlocking” the trackers to work independent from the Fitbit cloud.

English
  • Originally Aired December 27, 2017
  • Runtime 60 minutes
  • Production Code 8908
  • Created December 27, 2017 by
    Administrator admin
  • Modified December 27, 2017 by
    Administrator admin