krellor

joined 2 years ago
[–] krellor@kbin.social 2 points 11 months ago* (last edited 11 months ago)

Hey, sorry it took so long to see your question. Here is a paper (PDF) on the subject with diagrams.

https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/42365/eth-4572-01.pdf

The link is composed of two parts, the emitter and the receiver. The emitter captures the LF signal and up-converts it to 2.5 GHz. The obtained 2.5 GHz signal is then amplified and transmitted over the air. The receiver part of the link receives this signal and down-converts it to obtain the original LF signal. This LF signal is then amplified again and sent to a loop LF antenna which reproduces the signal that was emitted by the car in its integrity.

Edit: and here is a times article that covers the problem in one area. https://www.nytimes.com/2024/02/24/world/canada/toronto-car-theft-epidemic.html

[–] krellor@kbin.social 5 points 11 months ago (2 children)

Yeah. Shockingly people store things where it is convenient to have them. :) I'm glad I didn't have a keyless system to with about.

[–] krellor@kbin.social 4 points 11 months ago

I did read the article. I'm unfamiliar with the "hacking" tools or methods they mention given they use terms like emulator. I was simply sharing one wireless attack that is common in certain areas and why.

[–] krellor@kbin.social 8 points 11 months ago (8 children)

I think most of the wireless attacks aren't trying to be so sophisticated. They target cars parked at home and use a relay attack that uses a repeater antenna to rebroadcast the signal from the car to the fob inside and vice versa, tricking the car into thinking the fob is nearby. Canada has seen a large spike in this kind of attack. Faraday pouches that you put the fob inside of at home mitigates the attack.

[–] krellor@kbin.social 3 points 11 months ago (4 children)

I'm not sure about what the article is referencing, which is probably a little more exotic, but relay attacks are very common against keyless cars. Keyless cars are constantly pinging for their matching fob. A relay attack just involves a repeater antenna held outside the car that repeats the signal between the car and the fob inside the house. Since many people leave the fob near the front of the house, it works and allows thieves to enter and start the car. Canada has has a big problem with car thieves using relay attacks to then drive cars into shipping containers and then sell them overseas.

[–] krellor@kbin.social 8 points 1 year ago

With coffee ~~all things~~ heart palpations are possible. It took me about a year and a half between work and studies. Definitely not a day. 😀

[–] krellor@kbin.social 12 points 1 year ago

That's awesome, but no, they made something far more useful, lol. I'm glad to see projects like that though; it's a lost art!

[–] krellor@kbin.social 47 points 1 year ago (5 children)

Years and years ago I built my own 16 bit computer from the nand gates up. ALU, etc, all built from scratch. Wrote the assembler, then wrote a compiler for a lightweight object oriented language. Built the OS, network stack, etc. At the end of the day I had a really neat, absolutely useless computer. The knowledge was what I wanted, not a usable computer.

Building something actually useful, and modern takes so much more work. I could never even make a dent in the hour, max, I have a day outside of work and family. Plus, I worked in technology for 25 years, ended as director of engineering before fully leaving tech behind and taking a leadership position.

I've done so much tech work. I'm ready to spend my down time in nature, and watching birds, and skiing.

[–] krellor@kbin.social 160 points 1 year ago (3 children)

The article says that steam showing a notice on snap installs that it isn't an official package and to report errors to snap would be extreme. But that seems pretty reasonable to me, especially since the small package doesn't include that in its own description. Is there any reason why that would be considered extreme, in the face of higher than normal error rates with the package, and lack of appropriate package description?

[–] krellor@kbin.social 4 points 1 year ago

Thanks for the article, it was a fun read. I'll have to go back and re-read the majority opinion because I do remember some interesting analysis on it even if I disagree with the outcome.

[–] krellor@kbin.social 10 points 1 year ago (2 children)

While not related from a legal standpoint, the use of iPhones and intermediate devices reminds me of a supreme Court case that I wrote a brief about. The crux of it was a steaming service that operated large arrays of micro antenna to pick up over the air content and offer it as streaming services to customers. They uniquely associated individual customers with streams from individual antenna so they could argue that they were not copying the material but merely transmitting it.

I forget the details, but ultimately I believe they lost. It was an interesting case.

[–] krellor@kbin.social 3 points 1 year ago

Ants are the OG cooperative agent algorithms. Simulating ants use of pheromones to implement stigmergy path finding is a classic computer science algorithm.

view more: next ›