this post was submitted on 27 Feb 2025
127 points (95.7% liked)

Technology

63547 readers
2707 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 16 points 3 days ago (1 children)

The article seems very non-technical. From what I read about the Flipper Zero, Playback attacks aren't supposed to work on modern cars that use rolling codes. The only way the attack can work is if you intercept the signal from the keyfob while also preventing the keyfob's signal from reaching the car. Much easier said than done.

[–] [email protected] 2 points 3 days ago (1 children)

Grab some keys out a bag in the office while the owner isn't looking.

Grab a code (it's out of vehicle range, being inside).

Go to the car park, replay the code and loot the car.

You'd be caught quickly, but it's doable.

[–] [email protected] 5 points 3 days ago (1 children)

If you already have access to the keys why bother with anything else?

[–] [email protected] 2 points 3 days ago

You might not have access to the keys for a long period of time.

Only need a moment to take a code and leave the keys there. If the car isn't otherwise monitored, theft of contents without keys would be trivial.

You're probably getting busted anyway, but the concept is there.