-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Airkey AK3TX4 samples #461
base: master
Are you sure you want to change the base?
Conversation
The six packets you see are alternating OOK and FSK, very unique. To get codes try E.g. Get a row of codes and you may be able to spot a counter in there. |
Thank you @zuckschwerdt, very helpful. I didn't consider a counter as an anti-cloning feature, that would make sense, if the transmitter has an incrementing counter, the receiver only needs to store the last seen counter, and then sending old cloned codes won't work. I grabbed a bunch of samples using your spec, each button press seems to send the code 3 times(I guess 6 total, 3 times with OOK encoding, and 3 times with FSK encoding?). I wonder if the alternating OOK and FSK is a security feature or a compatibility feature? Here are the 43 codes I grabbed in hex:
and in binary:
I can see that bytes 4-7 are always identical, maybe an identifier for which encryption key to decode with? I don't see any non-encrypted counter. |
Hoping to get some pointers as to how to go about decoding these messages.