-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fixed_key.bmp #1
Comments
Hey, Right now you should be able to use the new version (v0.4.0) to access Your devices from the cloud, so You can test the extracted credentials. It would be great if You could create a PR to add credentials for Regarding the As I wanted only to gain cloud access to my devices, I didn't look at the code not directly linked with it. I'll keep this issue open, maybe somebody else will be able solve this mystery in the future :). |
hey @kueblc , can you share the secret2 and certsign for the smart life app ? thnx |
ok, found them , maybe usefull for in the readme, these are for smartlife:
|
Great work reverse engineering the bitmap embedded key, I've been working at this too with small gains.
I was successfully able to use your code to extract the
t_s.bmp
key fromcom.tuya.smartlife
version3.8.5
, app secretekmnwp9f5pnh3trdtpgy
, extracted keyjfg5rs5kkmrj5mxahugvucrsvw43t48x
.Do you have any ideas about what
fixed_key.bmp
might be?bmp_keys.zip
The text was updated successfully, but these errors were encountered: