• CanadaPlus@lemmy.sdf.org
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    10 months ago

    It sounds like a lot of the thefts work based on the principle of amplifying the fob so it seems close to the car even when it’s not. Because all reasonable EM radiation can be amplified, there’s no simple way to beat that short of going back to requiring a fob button push, so it’s basically convenience vs. security.

    They could try fobs that are smart enough to guess whether they’re being handled normally when activated, but that will 100% annoy consumers any time they try and do something the software doesn’t expect. It could even get as bad as the consumer putting the fob on a flat surface in another vehicle, and gently driving it up to the vehicle they want to move into.

    • brax@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      10 months ago

      I’m not sure how they’re pulling that kind of attack off with a flipper, unless they’re relying on the gpio and/or custom firmware

      • CanadaPlus@lemmy.sdf.org
        link
        fedilink
        arrow-up
        2
        ·
        10 months ago

        Yeah, flippers are completely irrelevant to the whole problem as far as I can tell, beyond also being a cheap radio.