All thanks to this amazing documentation actually. Without that documentation/reverse engineering information, I would never figure out how to properly decode the BLE advertising packets.
I just decided to build it using Web Bluetooth API, since I realized no one did it before. (Same idea but built using other language: Android, Node.js, Python)
That's so cool I never knew we could intercept the data like that. How did you manage to figure that out?
All thanks to this amazing documentation actually. Without that documentation/reverse engineering information, I would never figure out how to properly decode the BLE advertising packets.
I just decided to build it using Web Bluetooth API, since I realized no one did it before. (Same idea but built using other language: Android, Node.js, Python)
Awesome thanks for the insights!