sync reverse engineering
I imagine this has been tried long ago, but has anyone been able to reverse engineer the sync protocol built into the kindle 4?
Off the top of my head a man-in-the-middle "attack" seems doable involving mitmproxy and changing /etc/hosts (or via DNS) and replacing ssl/tls keys in /etc/ssl/certs/ca-certificates.crt and /usr/lib/java/cacerts.
Doesn't seem too involved with ssh access to the kindle... Does anyone know if this been done before or are there additional protections that prevent reverse engineering this?
|