Просмотр исходного кода

Add ver info to readme. Add note about Xtreme DEV.

Derek Jamison 2 лет назад
Родитель
Сommit
0433946a83
2 измененных файлов с 5 добавлено и 1 удалено
  1. 2 0
      .flipcorg/README.md
  2. 3 1
      README.md

+ 2 - 0
.flipcorg/README.md

@@ -4,6 +4,8 @@ Rolling Flaws by [@CodeAllNight](https://twitter.com/codeallnight).
 
 [YouTube demo](https://youtu.be/gMnGuDC9EQo?si=4HLZpkC4XWhh97uQ) of using Rolling Flaws application.  The video shows how to use the application to simulate a receiver that has a Replay attack flaw, Pairing FZ to a receiver, Cloning sequence attack, Future attack, Rollback attack & KGB attack.  The Rolling Flaws application also supports things like "ENC00" attack & window-next attacks, which are described in scenarios below but was not in video.  Rolljam is discussed in document, but discouraged to test since it is [illegal to jam signals](https://www.fcc.gov/general/jammer-enforcement) in the US.  If you have additional ideas, please let me know!
 
+Note: This application works with Official firmware & most of the other firmware versions as well.  Xtreme firmware needs to be on DEV channel to build.
+
 - Discord invite: [https://discord.com/invite/NsjCvqwPAd](https://discord.com/invite/NsjCvqwPAd)
 - YouTube: [https://youtube.com/@MrDerekJamison](https://youtube.com/@MrDerekJamison)
 - GitHub: [https://github.com/jamisonderek/flipper-zero-tutorials/blob/main/subghz/apps/rolling-flaws](https://github.com/jamisonderek/flipper-zero-tutorials/blob/main/subghz/apps/rolling-flaws)

+ 3 - 1
README.md

@@ -1,9 +1,11 @@
 # Rolling Flaws
 
-Rolling Flaws by [@CodeAllNight](https://twitter.com/codeallnight).
+Rolling Flaws (version 1.2) by [@CodeAllNight](https://twitter.com/codeallnight).
 
 [YouTube demo](https://youtu.be/gMnGuDC9EQo?si=4HLZpkC4XWhh97uQ) of using Rolling Flaws application.  The video shows how to use the application to simulate a receiver that has a Replay attack flaw, Pairing FZ to a receiver, Cloning sequence attack, Future attack, Rollback attack & KGB attack.  The Rolling Flaws application also supports things like "ENC00" attack & window-next attacks, which are described in scenarios below but was not in video.  Rolljam is discussed in document, but discouraged to test since it is [illegal to jam signals](https://www.fcc.gov/general/jammer-enforcement) in the US.  If you have additional ideas, please let me know!
 
+Note: This application works with Official firmware & most of the other firmware versions as well.  Xtreme firmware needs to be on DEV channel to build.
+
 - Discord invite: [https://discord.com/invite/NsjCvqwPAd](https://discord.com/invite/NsjCvqwPAd)
 - YouTube: [https://youtube.com/@MrDerekJamison](https://youtube.com/@MrDerekJamison)
 - GitHub: [https://github.com/jamisonderek/flipper-zero-tutorials/blob/main/subghz/apps/rolling-flaws](https://github.com/jamisonderek/flipper-zero-tutorials/blob/main/subghz/apps/rolling-flaws)