Comment by kilburn Comment by kilburn 3 months ago 1 reply Copy Link View on Hacker News There's no car identification in this protocol, meaning that impersonation/mitm attacks are trivial. Try again :)
Copy Link bufferoverflow 3 months ago Collapse Comment - I don't see it. Give an example of how this attack can be executed, a practical application.I approach my car, I press the button on the fob to open it, and your attack does what exactly? Reply View | 0 replies
I don't see it. Give an example of how this attack can be executed, a practical application.
I approach my car, I press the button on the fob to open it, and your attack does what exactly?