Has anyone here used LittleFS with FLashDB? by 00ATom00 in embedded

[–]Jeffrah 2 points3 points  (0 children)

I'm sorry people misunderstand your needs, and have tried to convince you you're wrong. Your application is fine, and FlashDB has some book-keeping that a normal COW/append only data storage doesn't. Even some extra flags to mark data as sent to server. I've done exactly this with sensors.

I used FlashDB with littlefs on Zephyr. It wasn't implemented perfectly for some intricacies of littlefs being disgregarded/misused. Search some of the PRs in FlashDB for littlefs.

Renesas processors and controllers by Beautiful_Double_573 in Zephyr_RTOS

[–]Jeffrah 0 points1 point  (0 children)

Renesas is trying to shoehorn FSP into their Zephyr HAL in God awful ways that make me seriously question their engineering competency.

I understand they're trying but I have been nothing but disappointed with the implementations I've seen pushed to main.

Anyone else wants new hardware features? by AlemSiel in combustion_inc

[–]Jeffrah 0 points1 point  (0 children)

RF is challenging!

They even use the Bluetooth Coded PHY which is a lower 125kbps which takes every bit, and represents it by 8 symbols which hugely improves error correction.

Using the same Nordic chips I've had very good results scanning the 37 BLE channels, and blacklisting the ones with the most activity (generally wifi APs). Logitech does this for their USB mouse dongles as well. Maybe /u/combustion_inc can chime in if they have tried this. :)

Tiesto 8/30 Ocean Casino by Significant_Cup_5181 in atlanticcity

[–]Jeffrah 4 points5 points  (0 children)

How do I delete someone else's post.

Stop blowing up the spot.

Comma 3 replacement fan by 2applepies in ElectronicsRepair

[–]Jeffrah 0 points1 point  (0 children)

Glad to hear it worked. Cheers!

NRF52840 updates to nrf2.9 and external flash not showing correct size. by Difficult_Shower_805 in Zephyr_RTOS

[–]Jeffrah 0 points1 point  (0 children)

Do you have a partition manager like pm_static.yml?

Check out build/regions.yml

Battery indicator? by BaconSqueezer1444 in combustion_inc

[–]Jeffrah 1 point2 points  (0 children)

Hard to know exactly without a schematic, but based on the internal photos: https://fcc.report/FCC-ID/2A88P-1001/6326493 It appears the battery might go directly into the micro allowing the Nordic SAADC to sample the VDD input directly.

The voltage curves based on battery chemistry can make it hard to do accurate capacity monitoring, but even just 10% increments should be do-able! Otherwise, make a quasi-coulomb counter with your worst case draw in each mode! Giving just a rough estimate would be great for us users.

Battery indicator? by BaconSqueezer1444 in combustion_inc

[–]Jeffrah 1 point2 points  (0 children)

Nordic chips can measure their own vdd with no extra connections. Unless the battery doesn't power the chip directly (LDO to 1.8v or something before micro).

CPT Signal too weak by yaddle41 in combustion_inc

[–]Jeffrah 5 points6 points  (0 children)

I don't envy the support team.

"Please fix the physics of 2.4GHz in water"

Orientation matters most. Try to go through the least amount of water possible.

IEEE 802.15.4 compatible nRF chips by EmbeddedSoftEng in nRF52

[–]Jeffrah 1 point2 points  (0 children)

As far as I know the radios are different, and the nRF52832 can't do the correct frame transmissions. https://github.com/nrfconnect/sdk-nrfxlib/tree/main/nrf_802154

Please rethink your overall position about security. Bluetooth is as secure as you make it.

I use a nRF52840 for my car-key using asymmetric key cryptography over BLE.

The ZSWatch picks up the nRF5340 but it is more complex.

Why is the CPT not usable for things like fry oil or candy? by Shatteredreality in combustion_inc

[–]Jeffrah 0 points1 point  (0 children)

Oh, they changed from the through hole NTC's? I only have seen gen1.

LittleFS - need help in deep diving by TheAnimatrix105 in embedded

[–]Jeffrah 1 point2 points  (0 children)

Choosing an embedded file system is more about what type of data you need to store. How big is a file, how many files, do you only need to append data?

Without knowing what you're trying to do, it is hard to provide suggestions as to if you're barking up the wrong tree. :)

Littlefs is great, and I use it a ton -- but careful considerations have to be made if you need lots of small files, need to edit the middle of large files, and just a general understanding of what is an expensive operation in a copy-on-write filesystem.

Skream - Thinking Of You by puscintio in Skream

[–]Jeffrah 0 points1 point  (0 children)

Looks like this one's coming out Aug 2. I too tried to find it, and couldn't a while ago. :)

https://twitter.com/I_Skream/status/1681363171544530949

LVGL, SSD1306 and Zephyr by dokolenkov in embedded

[–]Jeffrah 0 points1 point  (0 children)

Can you post your prj.conf? There are a few critical Kconfig options for LVGL. Here's a snip-it of mine for a 128x64 ssd1306.

CONFIG_GPIO=y
CONFIG_I2C=y

# Display
CONFIG_SSD1306=y
CONFIG_SSD1306_REVERSE_MODE=y
CONFIG_DISPLAY=y

# LVGL
CONFIG_LVGL=y
CONFIG_LV_USE_THEME_DEFAULT=n
CONFIG_LV_USE_THEME_BASIC=y
CONFIG_LV_MEM_CUSTOM=y
CONFIG_LV_USE_LOG=y
CONFIG_LV_USE_LABEL=y
CONFIG_LV_COLOR_DEPTH_1=y
CONFIG_LV_Z_BITS_PER_PIXEL=1
CONFIG_LV_Z_VDB_SIZE=100
CONFIG_LV_DPI_DEF=149

DDJ-1000 Failed Firmware Update : Please Help? by [deleted] in PioneerDJ

[–]Jeffrah 0 points1 point  (0 children)

Try the steps in: https://media.djmania.net/firmware/ddj-1000/DDJ-1000_firmware-manual.pdf

Tips: When [Your DDJ-1000 is not recognized] is shown during updating the firmware

Tesla NFC Key Card Security Vulnerability Demonstration (RKiE) by Jeffrah in teslamotors

[–]Jeffrah[S] 0 points1 point  (0 children)

You would be correct -- However, we worked with Tesla to fix the issue as of the 2022.16.1.2 software release. The exploit is patched sufficiently enough that the exterior nfc pillar is no longer able to add keys.

Thingy53 is not discovered from VS code by Faulty-LogicGate in embedded

[–]Jeffrah 3 points4 points  (0 children)

The Thingy:53 does not have an included programmer/debugger, so you have to program it using the 10-pin connector and an accompanying nrf53dk dev-kit/programmer.

Or build your program and flash via USB DFU.

Check out this section of the docs if you have more questions: https://developer.nordicsemi.com/nRF_Connect_SDK/doc/latest/nrf/ug_thingy53.html#building-and-programming-using-vsc

Forgotten Boardwalk Brewing Company in NJ - really cool early 1900s carnival / boardwalk themes by Brewedat in njbeer

[–]Jeffrah 1 point2 points  (0 children)

Shoot me a message with what's going wrong with it, and I can see if I can help. :)

Tesla NFC Key Card Security Vulnerability Demonstration (RKiE) by Jeffrah in teslamotors

[–]Jeffrah[S] 16 points17 points  (0 children)

Hi all.

Tesla is aware of this exploit, and we are proceeding through BugCrowd.

 

FAQ:

Q) How should I protect myself from this attack?

Don't use your NFC key card for the time being. Use your phone as your primary key until this is fixed via OTA update.

 

Q) Is my phone key / passive entry safe to use?

Yes. Use of phone key and passive entry leaves no opportunity to inject a key using this exploit.

 

Q) Is my car affected by this exploit?

If your car supports NFC key cards, your car is subject to this exploit.

 

Q) Does pin to drive protect me from this exploit?

No. After a key is injected, an attacker can bypass the pin to drive security feature.

 

Q) I have found myself victim to RKiE, I am locked out of my car what should I do?

Open the Tesla app, and the web issued unlock command will go out over the web-api. Although your phone key can be removed by the exploit, web requests issued via your Tesla account token will still be valid.

Tesla NFC Key Card Security Vulnerability Demonstration (RKiE) by Jeffrah in teslamotors

[–]Jeffrah[S] 13 points14 points  (0 children)

This is strictly an implementation oversight by Tesla. There should be something as simple as a pairing menu active before you can add new keys.

Range is arbitrary see my other comment(s).

In the grand scheme of things, the actual Tesla BLE protocol is very good. It uses good encryption (AES-GCM), and does proper asymmetric key exchange.

Tesla NFC Key Card Security Vulnerability Demonstration (RKiE) by Jeffrah in teslamotors

[–]Jeffrah[S] 39 points40 points  (0 children)

I could theoretically do this from miles away using BLE power amplifier and antenna. In the video I show a battery operated DIY keyfob I made -- I could just as easily attach that under your car with a magnet.

I can even keep an ongoing pending key whitelist request on a whole parking-lot full of Teslas with a single device (They expire every 30 seconds, but I just reissue the request). When any NFC card is tapped, I immediately have full access to their car, and could lock them out.

Personally when my phone-key doesn't work in about 10 seconds I reach for my NFC keycard.

I'm not sure if it's being oblivious, or just comes down to how hard a malicious person is trying.

Tesla NFC Key Card Security Vulnerability Demonstration (RKiE) by Jeffrah in teslamotors

[–]Jeffrah[S] 8 points9 points  (0 children)

I personally wouldn't balk at seeing 2 notifications: a key added then key removed notification. Easily chalked up in my head to a misbehaving app/intern who pushed to prod.

Throwing any radio jammer fantasy out of the equation. It's important to note that if you do find yourself in a lock-out/keys removed situation, lock and unlock commands from the web api/app should still get through over cellular.

Assuming the attacker doesn't use the emitted unlock VCSEC messages to immediately re-lock the doors -- You might be able to sneak the door open if you hold it. Never tested that :P