← Back to context

Comment by runtimepanic

10 hours ago

Nice write-up. Bluetooth on Kindle always felt like a black box, and this does a great job of peeling it open layer by layer. The mix of firmware analysis, protocol reverse engineering, and practical constraints of embedded devices is especially useful. Also a good reminder of how much attack surface quietly lives in “secondary” features like Bluetooth that most users never think about.