<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>MDNS on Tyler's Blog</title><link>https://blog.zars.me/tags/mdns/</link><description>Recent content in MDNS on Tyler's Blog</description><generator>Hugo</generator><language>en-us</language><copyright>© Athul</copyright><lastBuildDate>Wed, 02 Aug 2023 12:13:32 +0530</lastBuildDate><atom:link href="https://blog.zars.me/tags/mdns/index.xml" rel="self" type="application/rss+xml"/><item><title>Hacking Together An Elgato Key Light Air Siri Shortcut</title><link>https://blog.zars.me/posts/elgato-key-light/</link><pubDate>Wed, 02 Aug 2023 12:13:32 +0530</pubDate><guid>https://blog.zars.me/posts/elgato-key-light/</guid><description>Overview The Elgato Key Light Air has a hidden unprotected HTTP API running on the device at all times. This API lives behind port 9123 and allows for information GETting and PUTting. This allows anyone to get the current configuration of the light and update those values. The original source for the finding of this API can be found here.
The JSON used for the GET/POST request looks like this:</description></item></channel></rss>