Skip to content

Latest commit

 

History

History
32 lines (17 loc) · 1000 Bytes

File metadata and controls

32 lines (17 loc) · 1000 Bytes

ShiningAppMask-ReverseEngineering

Intro

After recently buying a Shining App Mask, I was curious about the Shining Mask App and mask and how they worked. I decided to reverse engineer it to understand how it worked.

The journey started with the hardware.

The Android Mobile App can be found here:

(Android)[https://play.google.com/store/apps/details?id=cn.com.heaton.shiningmask&hl=en_GB] (Apple)[https://apps.apple.com/us/app/shining-mask/id1528108780]

Files and Notes

  • (eepromdump)[eepromdump/]: Dumps of the eeproms as I play with the mask.
  • (notes)[notes/]: I've also been making notes along the way, they can be found here.

CAn Anyone Help?

  • Unable to locate information on the chip BP27387-23A2, it's a QFN 20 package.
  • See reverse engineering notes to see pinout.

Contribute

Feel free to contribute to this project by opening an issue or submitting a pull request.

##License

MIT License