Welcome to Incremental Social! Learn more about this project here!
Check out lemmyverse to find more communities to join from here!

mx_smith

@mx_smith@lemmy.world

This profile is from a federated server and may be incomplete. Browse more on the original instance.

mx_smith ,

I’m confused, in the article he said it was a brick to whoever has his stolen phone. How did they get his phone number to send him text messages? Did they crack the passcode and needed the iCloud password?

mx_smith ,

So they took the SIM card out and got the phone number from that? I guess I didn’t realize you could do that.

mx_smith ,

How would you set that pin on a SIM card in an iPhone?

mx_smith ,

That’s interesting, never thought of that as an attack vector.

mx_smith ,

Thanks!

mx_smith ,

Don’t even try and format code with markdown, now you have to make a post with a title.

mx_smith ,

Actually you can find many videos on YouTube that show how to disable the OnStar transmitter and you can always wrap those internal antennae in foil.

mx_smith ,

It’s near impossible to clone the signal from newer rolling codes, you need to trigger the key fob with out the signal reaching the car and then recorded with the flipper zero, then played back to the car. It takes a lot of coordination using the key fob. Here are some videos of it.

https://youtu.be/HwdoHMVKTpU?si=BZpgfJRsOjquIqL1

https://youtu.be/5CsD8I396wo?si=5Mkc6EFUH2HZG9vo

mx_smith , (edited )

Oh my bad, I was inferring that from the original article. Those articles you posted are good and talk about the CAN attack, but the original article talks about the rolling codes using a flipper zero like device.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • incremental_games
  • meta
  • All magazines