Hey, I recently reverse engineered Tesla's BLE protocol which is used by (model 3 + y) keyfobs, the phone key, tire pressure sensors, and possibly more! I had a very fun time reverse engineering the Android app, and figuring out how cryptography even works; yes there's good cryptography involved!
Anyways after lots and lots and lots of hours of research... I finally found a way to extract Tesla's VCSEC (Vehicle Controller Secondary) protobuf. VCSEC is responsible for unlocking the car from the keyfob and the phone key. After extracting that I began experimenting a lot, until I got the cryptography and everything else just right!
After lots of documentation, I have made this website so that you too can use it in your own apps and products to control certain aspects of the car! You can find it at teslabtapi.lexnastin.com! Make sure to read the getting started section completely as it contains all the required info that you need to get started with the BLE API.
Thanks!
Anyways after lots and lots and lots of hours of research... I finally found a way to extract Tesla's VCSEC (Vehicle Controller Secondary) protobuf. VCSEC is responsible for unlocking the car from the keyfob and the phone key. After extracting that I began experimenting a lot, until I got the cryptography and everything else just right!
After lots of documentation, I have made this website so that you too can use it in your own apps and products to control certain aspects of the car! You can find it at teslabtapi.lexnastin.com! Make sure to read the getting started section completely as it contains all the required info that you need to get started with the BLE API.
Thanks!