Get the latest tech news

Pixmob IR Reverse Engineering


Hacking the PixMob infrared (and now also RF!) protocol to enable control of PixMob wristbands at home. - danielweidman/pixmob-ir-reverse-engineering

We tested with six different versions of PixMob bracelets manufactured between 2014 and 2021 from various events including Portland Trail Blazers games, Superbowl LIV, and concerts of Taylor Swift, Coldplay, and The Weeknd. By repeatedly running brute force processes, observing results on bracelets, and re-evaluating which bits to target, we were able to discover many functional IR codes to produce: Make sure to set the IR tranmitter data pin variable and note down the port/device address (COM port on Windows, /dev/<something> on Linux and macOS) of the Arduino.

Get the Android app

Or read this on Hacker News