TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tesla Model S Can Be Stolen in Seconds by Cloning Its Key Fob

62 pointsby rubenbeover 6 years ago

7 comments

lathiatover 6 years ago
A couple of relevant tweets from one of the authors on twitter:<p>&quot;Tesla responded to this by upgrading key fobs’ encryption in June and adding an optional PIN to cars last month. If your Model S is older than June, you can get a new key fob, turn on a PIN, or disable passive (no-click) unlocking&quot; <a href="https:&#x2F;&#x2F;twitter.com&#x2F;a_greenberg&#x2F;status&#x2F;1039202487822106624" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;a_greenberg&#x2F;status&#x2F;1039202487822106624</a><p>&quot;Just one more thing. Everybody is making fun of Tesla for using a 40-bit key (and rightly so). But Tesla at least had a mechanism we could report to and fixed the problem once informed. @McLarenAuto, @KarmaAutomotive, and @UKTriumph use the same system and ignored us.&quot; <a href="https:&#x2F;&#x2F;twitter.com&#x2F;TomerAshur&#x2F;status&#x2F;1039245324441792513" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;TomerAshur&#x2F;status&#x2F;1039245324441792513</a>
lathiatover 6 years ago
Most keyless systems are insecure in several other ways to a surprising degree for this decade.<p>Even in more recent years, most of them seemingly do not implement<p>(1) Time of flight checks, e.g. that a radio relay isn&#x27;t being used to get to the keyfob many more meters away in the house using a relay&#x2F;amplifier. This is a commonly exploited theft method currently. The Apple watch implements this to unlock your MacBook Pro(!) This has also been shown to be a viable attack method on many contactless payment terminals.<p>(2) Replay protection - another possible common attack is to receive the rolling code from transmitter, jam it so the car can&#x27;t hear it and wait for the remote to transmit a second one. Then you jam that also, store that code, but then re-transmit the first code and the car unlocks and now you have a second code to use to unlock the car later. It&#x27;s possible to both receive and jam the code by using a very precise tuned receiver, and jam in the surrounding the frequencies which in most cases the actual receiver (e.g. car) won&#x27;t have filtered out. This works particularly well on most garage doors.<p>(3) Let alone having some kind of recoverable&#x2F;brute forcible ID scheme, which as we can see here, is also true. I&#x27;m sure these aren&#x27;t the only ones.<p>It&#x27;s kindof silly really. I&#x27;d be curious to know if any manufacturers have been fixing this in the last couple of years.
评论 #17959026 未加载
perilunarover 6 years ago
Not just Model S:<p>&quot;We have only been able to verify our attack on a Tesla Model S in practice. However, Tesla did not design this system themselves but purchased it from Pektron. ... Pektron also designed keyless entry solutions for manufacturers such as McLaren, Karma and Triumph. ... This leads us to believe that the attack described here also affects the other manufacturers.&quot;
评论 #17959404 未加载
walrus01over 6 years ago
Oh dear. Seriously, 24-bit and 40-bit crypto of any variety?<p>Was it really so hard in the year 2013 to put at least a 128-bit AES key in the card?<p>With a sufficient directional panel antenna you could impersonate a car and query pocketed fobs in whole crowds of somewhat wealthy individuals. Aim the antenna and rig at the seating area of a trade show for middle&#x2F;upper management types in the technology industry, for instance.
评论 #17956267 未加载
Rebelgeckoover 6 years ago
There&#x27;s no excuse in 2018 for using a 40-bit key. Hopefully Tesla gives its customers the upgraded fobs for free.
评论 #17955810 未加载
评论 #17956377 未加载
village-idiotover 6 years ago
I thought software was supposed to be Tesla&#x27;s killer advantage. It seems like they are doing a lot of amateur hour stuff on their vehicles.
beneTleilaxover 6 years ago
Yikes!<p><pre><code> 0xFFFFFFFFFF :: 1,099,511,627,776 </code></pre> A 5 character password protects these vehicles.