it seems that the history data sent through the Tx buffer is encrypted? Is there a way to decrypt it? This would be really needed because I want to access the sensor without having internet connection.
Thank you very much!
Hi, you can look at our open source module : https://github.com/Parrot-Developers/node-flower-bridgeand the complete documentation here : http://developer.parrot.com/docs/FlowerPower/FlowerPower-BLE.pdf
I have already done that but there is no information in the documentation and also the source code how the Tx buffer payload data is encoded.
The documentation just tells how to receive the payload data.
You can't manually decrypt the buffer from the device. This buffer is decryptable only by the web service.This is because some informations are secrets.
Some educators are looking for this Flower Power : where can they buy it ?
Hmmm so does this mean that the user has to have internet to access the history information? This would mean a big limitation for many use cases...
Is it really not possible to decode history ? Parrot can provide information to help us to decode playload data ?
The history file is not really encrypted. We only need to know the file structure.Basically, there is a 16 bytes header followed by n entries of 12 bytes.
You can check details on my github project: https://github.com/BuBuaBu/flower-power-historyor the npm module on https://www.npmjs.com/package/flower-power-history