The Apple Watch, like other IoT devices, uses a host of different bespoke wireless protocols. How can we use fuzzing to systematically test Apple's implementation for security issues?