Originally Posted by
bberg22
The way I understood the recent type of attacks is they have a receiver that when you you hit your key fob to unlock or lock your car from a distance intercepts the signal and reads the code that pairs your key to your car. Then they can come back later and open your car using that code.
Article here:
http://www.wired.com/2015/08/hackers...opens-garages/
This type of attack would not be mitigated with a Faraday cage. If you were worried about keeping your keys "exposed" I suppose you could always use something like the bag they ship EZ-Passes in that blocks out all signals. An RFID blocker might also work. I know sometimes Law Enforcement uses these types of bags to put digital evidence in to prevent remote access/tampering of things like Cellphones and other mobile devices.
That only works once. Basically, they intercept the first code and blocks it, so the car doesn't unlock. The driver thinks nothing of it and hits it again, but this time the hacker records the second signal but sends the first one. The door unlocks. The hacker now has the ability to send the second code whenever they want, but it will only work once.
That said, that's only active transmitting fobs. This isn't true for Intelligent Access. To my knowledge, it's not possible to spoof the intelligent access systems at all, so the only thing that can be stolen is the remote pressing a button to unlock from a distance.
Bookmarks