Of course, this particular attack actually “works” with rolling codes (WILL desync your real keyfob), it requires the attacker to sniff one signal off your key (incl lock) and then they can spoof your key’s rollover protocol (and any button, not just the one they sniffed) to reset the rolling code back to 0 and allowing them access. Iirc it’s different from a standard replay attack in (definitely) that it can spoof other keys on the fob it hasn’t read, and (I think) that while a trad replay attack requires the car not to hear the signal when recording I believe that doesn’t matter with this attack.
Unfortunately I haven’t been able to test it out since I’m not buying a serial locked flipper firmware from some guy who just got out of prison selling it on telegram.
Doomsider@lemmy.world 3 days ago
It is almost like their should be something written down somewhere. Like a guideline or rule or something…
Oh that is right, it is called a regulation requiring basic wireless security for extremely expensive consumer items.
YiddishMcSquidish@lemmy.today 3 days ago
Nope can’t do that.
But with mega corpos
Won’t someone think of the multi billion dollar corporations‽