Experts alerted motor trade to security risks of ‘smart key’ systems which have now fuelled highest level of car thefts for a decade.
Experts alerted motor trade to security risks of ‘smart key’ systems which have now fuelled highest level of car thefts for a decade.
Aren’t all cars within the past decades using rolling keys?
This article does not do a good job of explaining what the attack vectors are.
https://lemmy.world/comment/7917009
Damn wtf. I think I learned of this and forgot
It’s near impossible to clone the signal from newer rolling codes, you need to trigger the key fob with out the signal reaching the car and then recorded with the flipper zero, then played back to the car. It takes a lot of coordination using the key fob. Here are some videos of it.
https://youtu.be/HwdoHMVKTpU?si=BZpgfJRsOjquIqL1
https://youtu.be/5CsD8I396wo?si=5Mkc6EFUH2HZG9vo
Here is an alternative Piped link(s):
https://piped.video/HwdoHMVKTpU?si=BZpgfJRsOjquIqL1
https://piped.video/5CsD8I396wo?si=5Mkc6EFUH2HZG9vo
Piped is a privacy-respecting open-source alternative frontend to YouTube.
I’m open-source; check me out at GitHub.
Those videos aren’t for cars with keyless entry. Those cars have a bladed key for placing in an ignition lock cylinder to start the vehicle (or in the case of the mini, which is a car I actually own, into the little slot for the round key fob).The flipper zero recording a code isn’t what I am talking about when I talk about repeater attacks. What I’m talking about is using a receiver to receive and amplify the code so that they can use keyless entry (where you simply touch the vehicles door handle with your hand with the key within three feet of the car) and only requires you to have the key on you. Did you read the other comment I linked? This isn’t about having a key with buttons that are required to be pressed to enter the car. This is literally about passive keyless entry. Please go read the articles I linked.
I mentioned nothing about signal cloning and you clearly didn’t read.
https://www.techtarget.com/whatis/definition/passive-keyless-entry-PKE
Oh my bad, I was inferring that from the original article. Those articles you posted are good and talk about the CAN attack, but the original article talks about the rolling codes using a flipper zero like device.
My bad, I didn’t intend to come off badly, I just literally had a similar conversation when someone who didn’t read what I wrote, completely ignored whole sections of the article, and I may have come off a bit terse as a result. But you are correct about the flipper zero specifically.
These are different attack vectors.
The classic one was listening to a key, then impersonating it later.
Rolling keys fixed that.
For keyless, the usual attack is working as a relay.
Victim is 30m from their car, too far for keyless.
Attacker stands between the car and the victim with a transceiver that links the car and the key together, despite the distance, and opens it.
Yes.