I'd say the 'ID' branded watches are a good start as that's what was used for this initial thread - and I've seen a few other nRF52-based watches by them too.
For nRF52, if you can get hold of the firmware binary we can at least check and see if it's encrypted. If it is we could hope that it's encrypted with the sample key that comes with Nordic's SDK - but if it isn't we're probably out of luck :(
Even if the app is obfuscated, could just monitor the network to see what files are downloaded (and we could hope it's not over HTTPS).
Espruino is a JavaScript interpreter for low-power Microcontrollers. This site is both a support community for Espruino and a place to share what you are working on.
I'd say the 'ID' branded watches are a good start as that's what was used for this initial thread - and I've seen a few other nRF52-based watches by them too.
For nRF52, if you can get hold of the firmware binary we can at least check and see if it's encrypted. If it is we could hope that it's encrypted with the sample key that comes with Nordic's SDK - but if it isn't we're probably out of luck :(
Even if the app is obfuscated, could just monitor the network to see what files are downloaded (and we could hope it's not over HTTPS).