I imagine this has been tried long ago, but has anyone been able to reverse engineer the sync protocol built into the kindle 4?
Off the top of my head a man-in-the-middle "attack" seems doable involving mitmproxy and changing /etc/hosts (or via DNS) and replacing ssl/tls keys in /etc/ssl/certs/ca-certificates.crt and /usr/lib/java/cacerts.
Doesn't seem too involved with ssh access to the kindle... Does anyone know if this been done before or are there additional protections that prevent reverse engineering this?
Off the top of my head a man-in-the-middle "attack" seems doable involving mitmproxy and changing /etc/hosts (or via DNS) and replacing ssl/tls keys in /etc/ssl/certs/ca-certificates.crt and /usr/lib/java/cacerts.
Doesn't seem too involved with ssh access to the kindle... Does anyone know if this been done before or are there additional protections that prevent reverse engineering this?