What the fuck? They did a mistake implementing a half-assed protocol and it’s the end user that has to pay for it?
The “usb ignition” debacle didn’t teach anything to those assholes?
Also, wasn’t them that used a default passphrase in creating a SSL certificate for the CAN bus or something like that so everyone could reverse engineer that?
This is some misleading reporting though, that same security flaw exists on all keyless vehicles, it’s not Hyundai specific. literally part of the article.
What the fuck? They did a mistake implementing a half-assed protocol and it’s the end user that has to pay for it?
The “usb ignition” debacle didn’t teach anything to those assholes?
Also, wasn’t them that used a default passphrase in creating a SSL certificate for the CAN bus or something like that so everyone could reverse engineer that?
edit: yes, it was them, they used multiple “encryption” keys by copying them verbatim from tutorials https://programmingwithstyle.com/posts/howihackedmycar/
CheapGPT> Make car, plz?
That last one sounds absolutely positive though
This is some misleading reporting though, that same security flaw exists on all keyless vehicles, it’s not Hyundai specific. literally part of the article.
That was a great read. Thanks for sharing