Experts ​alerted motor trade to security risks of ‘smart key’ systems which have now fuelled highest level of car thefts for a decade.

          • atrielienz@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            9 months ago

            Those videos aren’t for cars with keyless entry. Those cars have a bladed key for placing in an ignition lock cylinder to start the vehicle (or in the case of the mini, which is a car I actually own, into the little slot for the round key fob).The flipper zero recording a code isn’t what I am talking about when I talk about repeater attacks. What I’m talking about is using a receiver to receive and amplify the code so that they can use keyless entry (where you simply touch the vehicles door handle with your hand with the key within three feet of the car) and only requires you to have the key on you. Did you read the other comment I linked? This isn’t about having a key with buttons that are required to be pressed to enter the car. This is literally about passive keyless entry. Please go read the articles I linked.

            I mentioned nothing about signal cloning and you clearly didn’t read.

            https://www.techtarget.com/whatis/definition/passive-keyless-entry-PKE

            • mx_smith@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              ·
              edit-2
              9 months ago

              Oh my bad, I was inferring that from the original article. Those articles you posted are good and talk about the CAN attack, but the original article talks about the rolling codes using a flipper zero like device.

              • atrielienz@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                edit-2
                8 months ago

                My bad, I didn’t intend to come off badly, I just literally had a similar conversation when someone who didn’t read what I wrote, completely ignored whole sections of the article, and I may have come off a bit terse as a result. But you are correct about the flipper zero specifically.

    • GreatAlbatross@feddit.uk
      link
      fedilink
      English
      arrow-up
      10
      ·
      9 months ago

      These are different attack vectors.
      The classic one was listening to a key, then impersonating it later.
      Rolling keys fixed that.

      For keyless, the usual attack is working as a relay.
      Victim is 30m from their car, too far for keyless.
      Attacker stands between the car and the victim with a transceiver that links the car and the key together, despite the distance, and opens it.