Skip to content

Interested in how you extracted the protobuf spec #2

@mdrago1026

Description

@mdrago1026

Hi Humpheh,

I stumbled upon your library while trying to reverse engineer the Nest browser client Observe API. It has been extremely helpful so far. I am trying to reverse engineer the Nest Security products. I am focusing on the detects and the guard itself right now.

I see the events coming in, but obviously the protobufs haven't been dissected yet and the important parts are gibberish. For example, I can see arm/disarm events, but no protobuf decoder/base64->UTF-8 decoder yields anything meaningful for the data that I assume tells me the arm state. At this point I only know the arm state changed.

I am about to dive into the rabbit-hole of trying to build the protobuf from the un-uglified/minified JS, but I wanted to see what your approach was. I would love to contribute and help build this library!

Metadata

Metadata

Assignees

No one assigned

    Labels

    documentationImprovements or additions to documentationenhancementNew feature or request

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions