Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

GreatAlbatross ,
@GreatAlbatross@feddit.uk avatar

These are different attack vectors.
The classic one was listening to a key, then impersonating it later.
Rolling keys fixed that.

For keyless, the usual attack is working as a relay.
Victim is 30m from their car, too far for keyless.
Attacker stands between the car and the victim with a transceiver that links the car and the key together, despite the distance, and opens it.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • technology@lemmy.world
  • random
  • incremental_games
  • meta
  • All magazines