=== reverse engineering: software === original manufacturer's app: https://play.google.com/store/apps/details?id=wit.android.ble.smartenergymeter \\ conrad's app: https://play.google.com/store/apps/details?id=cei.android.ble.smartenergymeter [~/WiTenergy]$ ls -l *apk 1069410 cei.android.ble.smartenergymeter.apk 1107808 wit.android.ble.smartenergymeter.apk the whole thing seems to be based on TI's "sensortag" app: [~/WiTenergy]$ unzip -l wit.android.ble.smartenergymeter.apk Length Date Time Name --------- ---------- ----- ---- 126976 2014-10-18 01:36 assets/SensorTagImgA.bin 126976 2014-10-18 01:36 assets/SensorTagImgB.bin [...] [~/WiTenergy/wit.android.ble.smartenergymeter]$ grep -iE texas\|ti\|sensortag assets/* assets/about.html: assets/about.html:About BLE SensorTag assets/about.html:

BLE SensorTag application from Texas Instruments displays converted values from each of the six sensors assets/about.html: in the SensorTag. It also visualizes button presses. Up to four sensors may be used simultaneously (including keys).


assets/about.html:

© 2013-2014 Texas Instruments