Hi Morpheus,
The algorithm of encryption is proprietary to EByte, and I think It’s quite impossible to decrypt, but with brute force (if people try all the 255*255 combinations and the correct channel) people can intercept and read the communication.
Bye Renzo
Hi Woto,
thanks. It’s very interesting and helpful.
I’m going to examine the situation, but with your help, I think It will become simpler.
Thanks again, Renzo.
Hi Guy,
I check that normally aren’t needed, but to prevent messages and issues I add them every time.
So if It works correctly, don’t worry.
Bye Renzo
Only in the transparent transmission is the same.
In fixed transmission, you can use the values you want but they must also be set in the receiver and transmitter.
Bye Renzo
This reply was modified 1 year, 2 months ago by Renzo Mischianti.
I don’t support USB memory stick, I must check in witch way I can add It.
For now I release the support for Arduino GIGA network.
I’m going to check the USB integration.
Bye Renzo
Author
Posts
Viewing 15 posts - 121 through 135 (of 1,006 total)
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.