this post was submitted on 23 May 2024
45 points (95.9% liked)

United States | News & Politics

7154 readers
327 users here now

founded 4 years ago
MODERATORS
 

In a video shared with WIRED, researchers at the Beijing-based automotive cybersecurity firm GoGoByte demonstrated that they could carry out a relay attack against the latest Tesla Model 3 despite its upgrade to an ultra-wideband keyless entry system, instantly unlocking it with less than a hundred dollars worth of radio equipment. Since the Tesla 3's keyless entry system also controls the car's immobilizer feature designed to prevent its theft, that means a radio hacker could start the car and drive it away in seconds—unless the driver has enabled Tesla's optional, off-by-default PIN-to-drive feature that requires the owner to enter a four-digit code before starting the car.

top 16 comments
sorted by: hot top controversial new old
[–] pelespirit@sh.itjust.works 8 points 4 months ago (4 children)

Does anyone want to steal one?

[–] bstix@feddit.dk 11 points 4 months ago (1 children)

A lot of car thefts are just kids taking them for a thrill ride, trashing and leaving it.

Nobody wants to steal a tractor, but yet they do get stolen just as often as any other vehicle, because they're easy to unlock and start.

The GTA games got that part right.

[–] mynachmadarch@kbin.social 1 points 4 months ago (1 children)

I dunno. Have you seen the resale prices on some of those tractors, even when used? I sure want to steal one and hawk it. (I would never actually, just, I get the temptation)

[–] bstix@feddit.dk 2 points 4 months ago (1 children)

Even tractors are tracked by the manufacturer these days.

The high prices for used tractors are only for the old ones in specific nostalgic colours, like Grey Ferguson. Nobody wants a blue Ferguson?

[–] cerement@slrpnk.net 2 points 4 months ago

tractors before John-Deere started their anti-repair fuckery are worth more

[–] cerement@slrpnk.net 4 points 4 months ago (1 children)
[–] InternetUser2012@midwest.social 1 points 4 months ago

Parts alone, there is no aftermarket for them, but there are people that want to fix their own stuff.

[–] thanks_shakey_snake@lemmy.ca 3 points 4 months ago (1 children)

Car thieves: "You know, I just don't feel right supporting a company like Tesla by stealing from people who purchased their products."

[–] pelespirit@sh.itjust.works 3 points 4 months ago

Lol. My point is more that Tesla is going into the Prius side of the market.

[–] queermunist@lemmy.ml 1 points 4 months ago

It'd be really funny.

[–] queermunist@lemmy.ml 3 points 4 months ago (1 children)

When the Tesla bubble pops it's going to crash the whole tech sector. 😆

[–] Drewfro66@lemmygrad.ml 2 points 4 months ago (1 children)

If not also the entire automobile sector, and with it the American economy

[–] queermunist@lemmy.ml 1 points 4 months ago

Don't forget Boeing! I have no idea how they can just keep killing whistleblowers and convince investors their company isn't fucked.

[–] TachyonTele@lemm.ee 2 points 4 months ago

Radio signals. The ultimate in Tesla design.

[–] autotldr@lemmings.world 2 points 4 months ago

This is the best summary I could come up with:


For at least a decade, a car theft trick known as a “relay attack” has been the modern equivalent of hot-wiring: a cheap and relatively easy technique to steal hundreds of models of vehicles.

But when one group of Chinese researchers actually checked whether it's still possible to perform relay attacks against the latest Tesla and a collection of other cars that support that next-gen radio protocol, they found that they're as stealable as ever.

In a video shared with WIRED, researchers at the Beijing-based automotive cybersecurity firm GoGoByte demonstrated that they could carry out a relay attack against the latest Tesla Model 3 despite its upgrade to an ultra-wideband keyless entry system, instantly unlocking it with less than a hundred dollars worth of radio equipment.

Instead, a hacker's device near the car has, in fact, relayed the signal from the owner's real key, which might be dozens or hundreds of feet away.

Or, as GoGoByte researcher Yuqiao Yang describes, the trick could even be carried out by the person behind you in line at a café where your car is parked outside.

“That's how fast it can happen, maybe just a couple seconds.” The attacks have become common enough that some car owners have taken to keeping their keys in Faraday bags that block radio signals—or in the freezer.


The original article contains 437 words, the summary contains 220 words. Saved 50%. I'm a bot and I'm open source!

[–] InFerNo@lemmy.ml 2 points 4 months ago

Was just pondering over this.

Would it suffice to implement a handshake between fob and car, but also prevent the handshake from establishing if the car or fob receives its own signal, indicating its signal being replicated? Since it's a radio signal this would at least make it somewhat harder, but still not impossible, to relay a signal.