I want to create a virtual ‘The Handy’ device to understand and provide an open-source protocol aimed at development. To achieve this, first pairing has to be reverse engineered. The companion app connects to the device via bluetooth and pairs it to your router. Then the device connects to the server independently. The communication between the device and the server has to be understood. The server and ‘The Handy’ use HTTPS. So communication is encrypted eliminating any approaches to that as a middle-man. Instead the firmware has to be reverse engineered. However firmware updates are sent from the server to the device directly. It is still unknown, if the device ships a private key. If so, without it, a virtual device can not communicate with the server. The private key may not be readable from the device.
Are there any efforts to reverse engineering ‘The Handy’?