Nike Plus Fuelband Software Download Mac

Nike+ and Nike FuelBand NikeFuel is a gamification unit that composites steps and other activities to establish a point system by which you can track your fitness endeavors against those of your friends. Based on these points, you earn badges, displayed on the Nike+ website and within various Nike apps. Here's a quick video to show how to setup your Nike Fuelband through the Nikeplus.com website. You'll also have to download the application for it which is.

Nike Plus Fuelband Software Download MacSoftware

Software Download Games

  • According to Pocket-Lint. Nike has confirmed that the older Fuelband will get the new better algorithms, and double tap to tell the time, as well as sessions support via the app rather than the band.
  • As a Nike+ SportWatch user, I was shocked and devastated to receive an email from Nike informing me that they are retiring some of their Apps and Devices, including: Nike+ Connect software, Nike+.

[Simone] was trying to reverse-engineer the Bluetooth protocol of his Nike+ Fuelband and made some surprising discoveries. [Simone] found that the authentication system of the Fuelband can be easily bypassed and discovered that some low-level functions (such as arbitrarily reading and writing to memory) are completely exposed to the end user or anyone else who hacks past the authentication process.

[Simone] started with the official Nike app for the Fuelband. He converted the APK to a JAR and then used JD-Gui to read the Java source code of the app. After reading through the source, he discovered that the authentication method was completely ineffective. The authenticator requires the connecting device to know both a pin code and a nonce, but in reality the authentication algorithm just checks for a hard-coded token of 0xff 0xff 0xff 0xff 0xff 0xff rendering the whole authentication process ineffective.

Nike Plus Fuelband Software Download Mac Free

Mac

Nike Plus Fuelband Software Download Mac Os

After he authenticated with the Fuelband, [Simone] started trying various commands to see what he could control over the Bluetooth interface. He discovered that he could send the device into bootloader mode, configure the RTC, and even read/write the first 65k of memory over the Bluetooth interface–not something you typically want to expose, especially with a broken authentication mechanism. If you want to try the exploit yourself, [Simone] wrote an Android app which he posted up on GitHub.