Disassembling an Amazon Blink Mini camera

I used Ghidra twice, so that means I'm officially an expert in reverse engineering

Strap in kids, this post is about me physically hacking apart Amazon’s Blink Mini to get access to its firmware! No firmware was harmed or modified in the making of this post… yet.

Big thanks to Ada and Erin for helping me figure this stuff out!


I attended the 2022 Cybertruck Challenge a couple of weeks ago, in which I learned about hacking, then proceeded to hack trucks and truck accessories. It was super fun, and I made lots of cool friends. Unfortunately, 70% of the things that I did are covered under NDA, so I can’t talk about the ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ that I ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ using ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ by ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ and ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇ with the help of ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇. After three years though, the NDA will expire, so stay tuned for June 26, 2025, when you can read all about it, assuming I’m still blogging around then!

Look ma, I'm hacking!

Anyways, with what I gleaned from the 20 hours of instruction and 20 hours of hacking, I decided that I should apply what I learned to a real device! These $20 Blink Mini cameras that I bought a few months ago seemed like perfect victims to fuck around with!

Blink Mini camera from Amazon.

These cameras are cute little things that have a surprising number of capabilities:

  • A video camera that can see visible and infrared light
  • Motion detection
  • An infrared floodlight
  • Microphone
  • Speaker
  • Wi-Fi connectivity with Wi-Fi Direct capability

Unfortunately, you need to use the Blink app to do anything with this camera. It’s free, but it’s only a phone app (thye don’t have a web app) and if you want to record videos, you need to subscribe to their Blink Premium service, which costs $30/year for one device and a whopping $100/year for more devices! It’s also probably why the hardware is so cheap — they made it a loss leader for that service.

Hypotheses before breaking into it

  • There is a ROM on this device that I can dump.
  • This device runs an embedded Linux system.
  • Because the device supports over-the-air firmware updates, I should be able to write my own firwmare to the ROM.


I have 3 of these guys, and they’re relatively cheap anyways, so I didn’t mind having one sacrificial lamb. I basically just started savagely pulling it apart and cutting things up and hoping that I could reach the PCB.

Uh, maybe this isn't the best way to do this

But then I realized that maybe, this isn’t the correct way of opening it up. Perhaps, someone else has done a teardown of it. In fact, I found this YouTube video where someone did just that.

Wow, that was so much easier than I thought it was!

The exposed board!

Staring at the circuit board

There are actually two PCBs here, with a 26-pin header for talking between the two boards. One is the wifi/antenna board, and the other seems to have everything else.

The main board with the camera on top.
The main board with the light sensor exposed.
Antenna PCB, front.
Antenna PCB, back.

I looked around the two boards for some ICs with markings. Here are some interesting things I found.

Immedia Semi(conductor)

The marking on the antenna front that says "IMMEDIA SEMI 1660 WIFI REV C3"

Their LinkedIn says that they are “a leading provider of video and image processing chips for connected camera applications.” Hey, that’s what I have!

There’s another article that associates them with Blink.

Finally, I found this Reuters article that says that Amazon bought Blink and Immedia for $90 million. Vertical integration, of course.

AC1002B2… microcontroller? microprocessor?

Picture of the main board, focused in on the CPU.

Underneath this shield is this interesting little BGA chip. The markings say:


Searching for AC1002B2-FB, I found a bunch of weird international sites with ordering pages for the chip. They imply that Broadcom makes these?

Search results for AC1002B2-FB

Dropping a few letters off the end, though, I found a couple of results for AC1002B, but they are mostly just reviews for a different Blink camera. On the bright side, this confirms that this unit is indeed the CPU.

From that review, they say that the AC1002B is Immedia Proprietary, and has 4 cores and 200MHz, which means it packs some serious power for what it is!

Searching for NP6T9 gives, uh…

Search results for NP6T9. The first result is an Amazon link saying "Find helpful customer reviews and review ratings for Door Sex Swing - NaEnsen Sex Toys Slave Bondage Love Slings SM Game BDSM for Couples with Adjustable ..."

And searching for J-2104 yields nothing either.

Search results for J-2104. Nothing useful.

The quest for AC1002B2-FB

Google is not giving me any results for this stupid chip besides marketing materials and Blink-related advertising. The closest I got to a datasheet is this CPU, but it seems to be QFN rather than BGA, plus the performance specs are all completely wrong. I’ll just email those sketchy sites to see if they’ll give me anything.

W25Q32JW NOR Flash

Picture of the main board, focused in on the ROM.

This is the juiciest part that I found. The markings say:


The chip says WinBond 25Q32JWIQ. Looking it up, I found this Winbond datasheet for W25Q32JW flash ROMs, with a table that says that 25Q32JWIQ is the WSON-8 package version of it.

The available IC packages listed in the datasheet.

There seem to be traces leading from the ROM to the CPU, which further supports my hypothesis that this ROM contains the firmware that we want.

Traces leading from ROM to under the CPU.

The W25Q32JW datasheet says that it is a 1.8V 4MiB SPI NOR-flash chip. Unfortunately, it also says that it is possible for you to make some blocks of memory permanently read-only. If we can get a dump from this fucker, we will find out! And that’s the hard part, because I don’t know shit about that!

The Flash Chip Rabbit Hole

Please note that I have no idea what I’m doing after this point.

My first thought was to desolder it, then stare at the datasheet and interact with it using an Arduino. However, it seems that every SPI flash chip has has the same pinout, and their instruction sets share similar commands for basic things, like reading and writing.1 Also, Ada suggested that the NOR flash would probably tolerate being dumped in-circuit with a test clip.

Thankfully, there’s a million cheap SOIC-8 kits on Amazon that come with everything I’d need: SOIC-8 clip2, USB programmer, and a bunch of other adapters. Unfortunately, the USB dongle thing was like, 3.3V and 5V only? But I looked around a bit harder and found some kits with 1.8V adapters. This Indian guy on YouTube explained how everything fits together, and how that weird slot-machine-looking adapter worked, making me a bit more confident that I was buying the right tool.

Hypotheses now, as I wait for the programmer to arrive

  • The AC1002B2-FB has no on-chip flash, and all the firmware is on the ROM.
  • We will be able to dump the ROM in-circuit and no desoldering is necessary.
  • It might not be Linux, because it’s 4MiB and that’s really small. But at the same time, I have seen OpenWRT firmwares that are ~800kiB, so it’s not out of the realm of possibility.
  • Not all of the ROM is write-locked, because otherwise, you can’t do OTA updates. However, parts of the ROM may be locked. Specifically, I worry that the entrypoint code is locked, and that it performs digital firmware signature validation.
  • The chipset is a fairly standard one, so decompiling the machine code it is not impossible. They didn’t just make a whole new exotic proprietary instruction set just for this chip.

I’m probably overthinking. I should just be patient and wait for the flash dump.

  1. I figured this out by googling a random other flash chip and seeing that they’re extremely similar to each other.

  2. And because I’m extra paranoid, just to confirm that this clip works with WSON-8, I found this video from some guy in Tembisa, South Africa demonstrating that it works!