Second presentation of my research into reverse engineering a TomTom Runner GPS watch. In this I explain how I got running code inside an unfamiliar device and proceeded to bypass its security measures and extract firmware keys and code from the device. More details on my personal blog, at http://grangeia.io Presented in October 2015 at "Confraria de Segurança da Informação" in Lisbon