How to get into your, or somebody else's, Tesla

Kinja'd!!! "Cé hé sin" (michael-m-mouse)
09/10/2018 at 17:54 • Filed to: Tesla, McLaren

Kinja'd!!!0 Kinja'd!!! 8

Want to get into a Tesla or McLaren, even if it’s not strictly speaking yours?

Here we go.


DISCUSSION (8)


Kinja'd!!! aquila121 > Cé hé sin
09/10/2018 at 18:05

Kinja'd!!!0

From someone with no understanding of the details of the equipment used, I'm wondering: would it be possible to emulate the key fob signal of most other makes in a similar manner with this exploit? Is it foiled or more difficult on cars from other makes because of different security measures?


Kinja'd!!! RallyDarkstrike - Fan of 2-cyl FIATs, Eastern Bloc & Kei cars > Cé hé sin
09/10/2018 at 18:08

Kinja'd!!!0

My car operates on one of those old fashioned key things and nobody’s ever stolen it yet! :P


Kinja'd!!! Cé hé sin > aquila121
09/10/2018 at 18:19

Kinja'd!!!0

Apparently if the car is equipped with keyless entry from a company called Pektron, you’re good to go. Other systems require the, er, user to be near the car and the key fob at the same time.

Tesla have introduced a PIN system to combat it and I presume they can stop the car remotely as well.


Kinja'd!!! The Dummy Gummy > Cé hé sin
09/10/2018 at 18:59

Kinja'd!!!0

That was a cool demon stration but god damn at all the noise. Really wish I wasn’t wearing headphones.


Kinja'd!!! Chariotoflove > Cé hé sin
09/10/2018 at 19:18

Kinja'd!!!0

Neat, but it seems fairly risky requiring the thief to get in close proximity to the driver.  


Kinja'd!!! Flynorcal: pilot, offshore sailor, car racer and panty thief > RallyDarkstrike - Fan of 2-cyl FIATs, Eastern Bloc & Kei cars
09/10/2018 at 21:51

Kinja'd!!!0

Post a picture of it. Lol. 


Kinja'd!!! RallyDarkstrike - Fan of 2-cyl FIATs, Eastern Bloc & Kei cars > Flynorcal: pilot, offshore sailor, car racer and panty thief
09/11/2018 at 19:18

Kinja'd!!!0

Then again, it’s a 2009 Hyundai Accent, so nobody’s going to want it! ;)


Kinja'd!!! bhtooefr > Chariotoflove
09/20/2018 at 08:54

Kinja'd!!!1

Looks like it’s a replay attack (actually thinking about it, it’s not, but it just requires reading the fob once), so it just requires the thief to get in close proximity to the key fob, not necessarily the driver. (And, it’s possible that more optimized transmitting and receiving equipment could allow being a significantly further distance from the key fob.)

Note that similar exploits exist for other cars, based on attacking the fob from afar with amplifiers and directional antennas. This apparently goes beyond that by effectively cloning the fob.