Re: Clone: If someone knows that you are doing this, and maybe finds this forum :) can figure out how you are doing.
For example someone can go there, listen to BLE advertisements, and set up the same BLE advertisement with a separate device, and remove your BLE tag (or the item it's attached to).
Depends on how secure this must be. For example, LOGITacker uses nRF52840 dongles (kind of "bigger brother" of the nRF52832 in the Puck, but still just an easily available 10-15$ device) to attack Logitech wireless devices. And even take over a computer with taking over a keyboard / mouse.
Of course I don't know your circumstances. If you don't expect such "high-tech" attack, just listening to BLE advertisement & checking signal strength is probably good enough.
Espruino is a JavaScript interpreter for low-power Microcontrollers. This site is both a support community for Espruino and a place to share what you are working on.
Re: Clone: If someone knows that you are doing this, and maybe finds this forum :) can figure out how you are doing.
For example someone can go there, listen to BLE advertisements, and set up the same BLE advertisement with a separate device, and remove your BLE tag (or the item it's attached to).
Depends on how secure this must be. For example, LOGITacker uses nRF52840 dongles (kind of "bigger brother" of the nRF52832 in the Puck, but still just an easily available 10-15$ device) to attack Logitech wireless devices. And even take over a computer with taking over a keyboard / mouse.
Of course I don't know your circumstances. If you don't expect such "high-tech" attack, just listening to BLE advertisement & checking signal strength is probably good enough.