Get the latest tech news
Reverse Engineering and Dismantling Kekz Headphones
Close to a year ago, I stumbled upon the Kekz Headphones, which seemed like an interesting approach on the whole digital audio device space. They claimed to work without any internet connection and all of the content already on the headphones itself. I was intrigued, because there were some speculations going around, how they operate with those “Kekz”-Chips. I invite you to join me on a journey into the inner workings of those headphones. We will talk about accessing the encrypted files on the device, breaking the crypto and discovering disclosure of data from customers.
Close to a year ago, I stumbled upon the Kekz Headphones, which seemed like an interesting approach on the whole digital audio device space. The bit shifts cause significant information loss, and many different values could end up mapping to the same b5, b6, b7, b8 combination, leading to a large number of collisions. We can now encrypt, decrypt and brute force the cookie content, but you won’t get ny files onto or from the headset on your own, without opening up the headphones and accessing the SD Card.
Or read this on Hacker News