i bet it runs linux, i bet it can be easily hacked… because an item of this size & complexity of function cannot have a very secure connection and thus could probably easily be reverse engineered to connect to a raspberry posing as the company server. just man in the middle yourself…
Only if the company no longer runs the server, you can’t exactly reverse-engineer it because you don’t know what the server responds with to the client’s requests.
i bet it runs linux, i bet it can be easily hacked… because an item of this size & complexity of function cannot have a very secure connection and thus could probably easily be reverse engineered to connect to a raspberry posing as the company server. just man in the middle yourself…
Only if the company no longer runs the server, you can’t exactly reverse-engineer it because you don’t know what the server responds with to the client’s requests.