The tech used here is the popular Flipper Zero, an ethical hacker’s swiss army knife, capable of all sorts of things such as WiFi attacks or emulating NFC tags. Now, 404 Media has found an underground trade where much shadier hackers sell extra software and patches for the Flipper Zero to unlock all manner of cars, including models popular in the U.S. The hackers say the tool can be used against Ford, Audi, Volkswagen, Subaru, Hyundai, Kia, and several other brands, including sometimes dozens of specific vehicle models, with no easy fix from car manufacturers.

  • cecilkorik@lemmy.ca
    link
    fedilink
    English
    arrow-up
    117
    ·
    1 day ago

    And here I am just using my flipper zero to turn my fan on and off since the remote that came with it sucks.

    • TimeSquirrel@kbin.melroy.org
      link
      fedilink
      arrow-up
      39
      arrow-down
      1
      ·
      1 day ago

      I use it at work to clone a customer’s proximity card when I work in their building so they don’t have to leave me theirs to get around. The one legitimate use I found.

      I guess being able to trigger the customer service announcement without having to find a button in a store is nice.

        • Capricorn_Geriatric@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          12 hours ago

          That’s the definition of a legitimate use.

          Cloning keycards temporarily with permission (until new ones are made.) Breaking into your own or a friend’s car because the keys were left inside (until you get the keys back)

          Cloning a TV remote just to lower the volume to a sane degree and turn it off (until they get a new TV, remote or find the old one).

          Legitimate is a anything that you’re allowed to do. It’s a simple process to test legitimacy:

          Did someone ask you if you can help?

          If yes, did you tell them what you’d do?

          If yes, did they agree?

          And once you did whatever it was they agreed to, did you keep your ability to do the same thing in the aim of doing something they didn’t consent to (once you cloned their car key, do you plan on stealing the car? Or once you cloned their remote, do you have an insatiable urge to fuck with them by abusing the remote?)

          If you answer “yes” to all except the last one, the use is legitimate in 99.9% of cases.

          The only reason this may be considered a non-legitimate use would be if you attached the exclusive economic right of making repairs or new keys to the OEM, which isn’t how a sane world works.

          <hr>

          And besides, tools like the Flipper truly are hacking tools. Today hacking has a bad rep, and the word used to mean more like hack something together.

          Imagine Bob who is a DIY type of guy. His TV starts falling apart because the plastic casing broke. Bob takes some duct tape and glues the casing together. As the TV stand is also a bit wonky, he takes some screws as well just to be safe. He doesn’t plan on keeping it for too long, just until he can find a fitting replacement that’s not too expensive. Most likely, he’s bound to keep it until the next Black Friday.

          Bob just successfully hacked something up to keep his TV from falling apart.

          That’s the origin of the word “hacking”. “To hack up” got shortened by attaching a new meaning to the verb, without bothering with the entire phrase, and making it relate only to electronic/digital hacking. So the TV example isn’t hacking, but it is hacking up. It means “to make some temporary fix until a proper one isn’t found”.

          Today, hacking has been conflated with exploiting and breaking digital locks, which is not what the original phrase meant.

        • MartianSands@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          41
          arrow-down
          2
          ·
          1 day ago

          That’s probably debatable, if they have permission. They probably shouldn’t have been given permission, but that’s a separate issue

          • Nougat@fedia.io
            link
            fedilink
            arrow-up
            30
            ·
            1 day ago

            Ideally, there should be a visitor card available to be used, with its clearances configured as appropriate for the visitor in question. Having a person hand over their own card (and PIN, if applicable) isn’t a great idea either, but it’s far better than copying that card, with or without permission (probably without, if we’re being honest).

            • MartianSands@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              14
              ·
              1 day ago

              Oh, absolutely. It’s not something which should be encouraged, and against a well designed modern system it probably isn’t possible (there must be some challenge-response type NFC systems on the market).

              I’m just saying it isn’t unambiguously “illegitimate”

              • kn33@lemmy.world
                link
                fedilink
                English
                arrow-up
                5
                ·
                1 day ago

                there must be some challenge-response type NFC systems on the market

                There are. Hotels use them for door key cards so they can’t be cloned.

                • possumparty@lemmy.blahaj.zone
                  link
                  fedilink
                  English
                  arrow-up
                  5
                  ·
                  24 hours ago

                  Unfortunately… I was trying to clone a room key to my phone so I could just tap to enter when I stay 10 weeks in the same room.

          • TimeSquirrel@kbin.melroy.org
            link
            fedilink
            arrow-up
            14
            ·
            24 hours ago

            I usually do it when we take over a customer’s access control system and we we have half their doors on the new system and half in the old still and are migrating them over. I’m an electronic security tech, this is what I do for a living.

        • ozymandias@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          6
          ·
          edit-2
          1 day ago

          le·git·i·mate adjective /ləˈjidəmət/

          1. conforming to the law or to rules.

          “Do what thou wilt shall be the whole of the law” - Aleister Crowley

          seems legit to me…

      • cecilkorik@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 day ago

        Oh I think I used it to unlock some extra characters in Skylanders at some point too, but I don’t really play those types of games anymore.

    • Sabata@ani.social
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 day ago

      I like to hijack the robot vacuum when I go to DnD and ring my parents doorbell when I visit.

        • Sabata@ani.social
          link
          fedilink
          English
          arrow-up
          6
          ·
          22 hours ago

          I would let all the power go to my head with that one. Not that I go outside, let alone to bars.

          • ArcaneSlime@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            6
            ·
            21 hours ago

            Sometimes you gotta do what you gotta do, unless you want to hear Kid Rock butcher Sweet Home Alabama (which itself butchered Werewolves of London, and was only still good because you can hear Van Zandt drop his donuts, goddamn, in the back of the track) for the fourth time tonight.

            • maccentric@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              2
              ·
              11 hours ago

              Didn’t Sweet home Alabama precede Werewolves of London? Also, what does “drop his donuts” mean in this context?

              • ArcaneSlime@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                2
                ·
                edit-2
                9 hours ago

                Yes, which is why it’s weird they were able to steal it, gol’dang time travelers. No I wasn’t mistaken, time travelers. No I’m not bias because Warren Zevon rules, I said time travelers.

                “Drop his donuts” means his dough circles fell off a table during the studio recording. You can hear him say “my donuts! Goddamn!” in the back of the track, it’s hilarious.

        • Sabata@ani.social
          link
          fedilink
          English
          arrow-up
          4
          ·
          23 hours ago

          The physical IRL location where I show up to play Dungeons n Dragons, and not in game. DM’s got a robot vacuum.

    • paraphrand@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 day ago

      You can get devices that connect to home assistant for that too! (Just a comment, not a suggestion that you are doing anything wrong.)