- cross-posted to:
- technology@lemmy.zip
- canada@lemmy.ca
- cross-posted to:
- technology@lemmy.zip
- canada@lemmy.ca
If the flipper can help you stealing a car, the flipper is not the problem, but the neglect and incompetence of the car company is.
Removed by mod
"It is unacceptable that it is possible to buy tools that help car theft on major online shopping platforms.”
I can buy a hammer and screwdriver online, and those could be used for car theft. Does that make those also unacceptable?
They’re also really good at murder, a much more serious crime.
While we’re at it let’s just ban all metal cutlery, just to be on the safe side.
Go then champ
Removed by mod
By smashing the window and clicking the unlock button inside the vehicle.
I guess you haven’t seen all the TikTok videos of kids steeling Kia’s with nothing but a USB cable (used to turn the ignition, not anything digital).
To be fair, it doesn’t work in Canada because immobilizers are mandatory. They really love their cost cutting in the US though…
Removed by mod
I can buy lockpicks, slimjims, and all sorts of other locksmith tools made specifically to gain access to cars quickly and easily. And I could have been doing so for way, way longer than the Flipper has existed.
So, rather than hold automakers accountable for not having proper and effective security practices you focus on a tool designed for security professionals.
This take is so unbelievably brain dead I’m surprised these people are able to breathe without machine assistance
Auto makers are really bad about it. CAN Injection has been a thing for a while now. Cars are going IoT, and a flipper will be the least of the vulnerabilities as things progress.
I’ve just had premonitions of cars crashing into each other in car parks when the ‘self parking’ mode is hacked…
Removed by mod
As things progress, security should improve. Keyword SHOULD. But they don’t because good security ain’t cheap.
Removed by mod
Direct quote from https://flipperzero.one/:
Flipper Zero Multi-tool Device for Geeks Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware, and more. It’s fully open-source and customizable, so you can extend it in whatever way you like.
Flipper Zero is a portable multi-tool for pentesters and geeks
multi-tool for pentesters
pentesters
Pentester or penetration tester is a cybersecurity professional that can be located on red team (offence) or blue team (defence) and works to determine potential vectors for attack that need to be rectified or exploited, depending on who they’re working for and what their goals are for their employer.
I mean of course the official website isn’t going to say “it’s a great tool for hackers and car thieves”
A tool is just that, a tool.
Just because what you consider immoral or moral individuals use it doesn’t change the inherent nature of the tool to be used for specific circumstances. You’ll also notice I didn’t put any deterministic language when describing a penetration tester, because regardless of what side of the law they’re on they’re still cybersecurity professionals, it’s just that one side happens to pay better.
A knife can be used to dissect as well as it can be used to mutilate or even vivisect. How a tool is used is determined by the user not the creator.
Complaining that a few people use the item for nefarious purposes when the majority of problematic cases are issues at the developer level for the items being affected (i.e. vehicles) is extremely short sighted. Are you going to restrict all PC’s because they can be used for network intrusion?
Are you going to limit access to the internet because the freely available information can teach anyone to create a dirty bomb?
The premise of your outlook is inherently erroneous in my opinion.
I’m not talking about the uses for the tool, I’m talking about how you used the company’s own website as a point of reference for the tool’s capabilities. They have a profit motive so of course they’re not going to advertise unsavory uses for their product, just like your knife companies aren’t going to advertise that their product can be used for mutilation.
But go on with your pedantry I guess.
The irony of you saying I am the one being pedantic is seriously hilarious.
You should probably work on your reading comprehension and critical thinking skills.
The entire premise of your argument is ‘only criminals use this tool’ or ‘the majority of users of this tool are criminals’ when that is fundamentally and objectively incorrect.
You clearly lack any serious experience in computer science, let alone cybersecurity, and it shows.
Sure, go ahead and blame the tool.
Then blame the science.
Then blame the scientists who developed it.Blame everything but the thief.
\s
Then blame free will for all crime in the world and all wars waged.
Removed by mod
I remember one of my seniors at work asking me how open source software manages to develop so much without a direct monetary incentive.
“There’s no lack of resources to give everyone everything they want.” <- is the point.Our civilisation has enough people who like coding, willing to put their spare time into OSS, to be able to get good quality tools for use in all fields. Now all we need is for all of those people to be given enough spare time without having to worry about things like mortgages, loan payments and basic survival in some cases and everyone can profit (including the companies who would be giving them the spare time).
Removed by mod
First blame the thief. But then in the same breath blame the manufacturers that refuse to sell cars with meaningfully working locks. If you understand the tech many car companies keep selling cars that have locks that are about as secure as a zip tie.
The companies will just go around blaming some random engineer for it and then go on throwing money for PR stuff.
Removed by mod
Car security is horrible
I bought a copying remote from aliexpress thinking “no way my car has a static code and not a rolling one… right?”
Nope, fuck you Kia, any stupid cheap remote from aliexpress can be used to copy keys from a surprising amount of cars.
Car security should improve and I hope this becomes a big enough issue that it get’s better regulated
I would have expected an OTP type code to unlock a car… Considering how expensive cars are, this is really cheap to implement. Heck, I could buy a yubikey for €25, and I’m sure if a big company wants to buy a million of them, they can do it for a fraction of that cost… A brand new car costs tens of thousands…, it should’ve been a no brainer to include better security.
Yeah, but saving 1.50 per car improves some stupid business performance indicator, which respectively will get some manager a nice bonus.
I believe you, this world is so weird… For companies that make tens of billions in profit, saving a million dollars on chips is almost a rounding error compared to the benefit to their reputation when their cars are more secure.
Ever since I first met the insanity that are business indicator numbers, I lost my believe in humanity. People knowingly hurt their companies effectiveness and prosperity just to improve those numbers. And they get rewarded for it.
Let’s ban a product instead of solving the issue at hand… Seriously? I hate my country more and more as each day passes
While this is seems a bit incompetent, it is easier for them to make technology less available than to fix the underlying issues here. They might set out to do both, but solving the underlying issues will take more time.
At least they’re trying to do the right thing, and they’re making an effort to deal with a problem that affects real people. Good on them.
This is like banning usb cables so Hyundai/Kia cars won’t be stolen, instead of forcing the car manufacturer to just install an actual immobilizer on affected vehicles. Seeing Hyundai/Kia do everything but install immobilizers is infuriating as well. They’re rolling out software updates, giving out wheel locks, installing cages on the ignition panel, etc. Literally everything but fix the problem.
This is like banning usb cables
If USB cables were used almost exclusively for illegal and just generally anti social behavior.
I’d never heard of this thing, and it does sound fun, but this was the use case list from the paragraph calling it a “humble hobbyist device” doesn’t come across as very defensible:
People can use them to change the channels of a TV at a bar covertly, clone simple hotel key cards, read the RFID chip implanted in pets, open and close some garage doors, and, until Apple issued a patch, send iPhones into a never-ending DoS loop.
But also agreed on fuck those car companies that just don’t care and would rather weaponize the government than try to fix anything (without a subscription fee of course). Anti social behavior forced Kia to change their shitty grift of a product so 🤷
exclusively for illegal and just generally anti social behavior.
Except they aren’t. These devices are used for various non-illegal purposes and are actually helpful for pentesters so we can learn about potential vulnerabilities on wireless systems before they can be exploited by bad actors. The same way a usb cable is useful for transferring data and at the same time can be used for illegal stuff (like literally any hack where you connect to a device via usb). The worst part (and the article mentions it), is that it doesn’t even work on security systems on cars built since the 90’s. So they’re banning something that isn’t even a problem in the first place.
I totally get and agree this is a dumbfuck response to the problem they allege to be fixing, and hopefully their committee it whatever concludes the same, but the article didn’t mention any redeeming values for the device as you did
So the article is biased, and you swallowed it whole sale.
How so
The problem is they are banning a device that doesn’t solve the issue at all except if you have a car from before the 90s. The tools being used for this are custom made with a much larger range. Maybe they should ban smartphones too since people are using them to detect laptops in cars to break into since they are being stupid about it.
How do you use a phone to detect a laptop in a car? If it’s on, sure I get it but if the laptop is asleep or off I can’t see how a phone will detect it?
Article said they were using Bluetooth and a app on play store / app store I assume the app measures the signal strength to determine the proximity to the devices. Maybe some laptops don’t turn off Bluetooth in their sleep state or people just weren’t putting their laptops to sleep? Could pickup tablets or phones forgotten in cars too.
As he said, that only works if the device is on, which would be really odd in a car. I’m not aware of any that keep comms on in sleep, since those are typically high power draw.
There are various sleep modes and it looks like Bluetooth can be active during some of them.
Most MacBooks keep Bluetooth on when in sleep mode. There isn’t even a setting to stop it, the only option is to manually turn Bluetooth off before closing the lid or to use 3rd party software to automate turning it off.
It won’t stop theives from being able to obtain them. And it’s a legit tool, should we ban all usb because they can be used to steal Hyundai and Kia cars?
It’s obvious there are flaws to car manufacturers theft protection. Shit watch LPL, lock noob, Bosnian Bill (hope you’re doing well brother) and you will see most locks are a fucking joke.
There are Defcon vids on YouTube that go over how cars can be hacked yet manufacturers are still using these systems
The road to hell is paved with good intentions.
This device is probably not what a professional car thief would use. It may be used sometimes by someone messing around, but it’s a tool made for an introduction into different types of penetration (testing). It doesn’t do anything as well as a more dedicated device would, and it’s also not as customizable. If a car is vulnerable to this then it’s vulnerable to a lot more things. Also, if someone really wants to steal your car they don’t need this device specifically.
More like hide the problem so no one knows about it. This is the entire locksmith ideology, security through obscurity and that has been working out great hasn’t it?
I don’t have any faith in our incompetent government to do anything right if it costs corporations money.
I figure half the purpose of these sorts of devices is to prove just how insecure certain systems are to bring about change. Governments rarely have a good grasp on this sort of thing though. It’s not like banning the device will make anyone more secure.
What does blackface Trudeau have to say on the matter I wonder.
Who gives a shit? He prob doesn’t know what it is or what it is used for either, and neither does his party apparently
Pick an issue. Literally any issue. Canada isn’t on the morally right side (with the exception of supporting Ukraine’s war for freedom).
People are fine. Landscape is amazing. Government at all levels needs to be gone. We’d be better off with actual criminal mobs running everything. They’d at least be competentYou should get those brain worms checked out
Just ordered one. I had no real interest, but once you tell me I can’t have one…I must have one.
Sales will go through the roof, and being black market will only give it more publicity.
Oh and yeah, it only works on cars without rolling codes, like, from the 90s
Or modern Kia cars, it’s horrible
Yesterday I saw a new looking Kia with a club on the steering wheel. It’s no joke how bad Kia fucked up.
You’ll love it
Streisand effect goes brrrr
Removed by mod
Did you really just use FOMO unironically? 🤣
Read everyone, this is hype, and Canada is being dumb on this one.
The Flipper Zero is also incapable of defeating keyless systems that rely on rolling codes, a protection that’s been in place since the 1990s that essentially transmits a different electronic key signal each time a key is pressed to lock or unlock a door.
Most of this reaction is due to staged videos on TikTok and politicians not understanding technology. Maybe they’ll stop a few joyriding kids, but car thiefs aren’t using F0s.
Politicians passing laws based on things they don’t understand?
Quelle surprise.
But also:
a protection that’s been in place since the 1990s
That’s not necessarily a guarantee, c.f. Hyundai and Kia’s lack of ignition locks.
Politicians passing laws based on things they don’t understand?
aka virtue signaling
Another way of saying that is moral grandstanding, which I kind of like better. I like the imagery of grandstanding, especially when describing politicians.
That’s not a thing in Canada. Our motor vehicle standards require immobilizers.
That’s because you all up there in America Lite hate capitalism, freedom, democracy, eagles, and baby Jesus.
Isn’t it possible for someone to code a code-roller onto the flipper zero app store?
Probably possible but the thing would be running for hours or days to crack the code. That’s not really useful for a quick hack.
If so I’m sure someone can find this app and show its been done?
With a jammer it’s definitely possible to bypass rolling codes with Flipper, but it’s only temporary and has limited usefulness
That isn’t bypassing rolling codes, that’s capturing a single code while preventing it from reaching the car.
And once the code is used once, or the fob gets a new code to the car, the previously captured code is useless.
This isn’t the same thing as bypassing rolling codes.
Hmm, I don’t know the precise terminology, I meant bypass as a way to temporarily get around the rolling code system without actually breaking the code itself. You’re probably right though
It’s pretty difficult, you need to get the rolling code from the fob, but you also need to jam it so it doesn’t reach the car.
Then you have one opportunity to replay the code before the holder of the fob hits the button in range and rolls the code over.
So even if you manage to set that up that only gets you in the car, it doesn’t get it started.
Yes correct, just pointing out that it is technically possible to get around the system
RollJam and RollBack are the exploits for bypassing rolling codes. These exploits are possible because you can replay captured codes at a later time.
What’s happening in most cases is the proximity-based fobs are simply amplified with a device to reach the person’s car in the driveway, since most people keep their keys by the door, and in some cases even within reach of the car without a device. It’s this low hanging fruit where the theft happens, or just a tow truck…
The Flipper is more of an enthusiast and pranking device. The devices used in actual thefts are like disposable $50 alibaba pieces of shit. Canada is effectively creating a clandestine market for simple radio amplifiers made from the most basic electronic components. As someone in Canada who used to build the classic cmoy Altoid-tin headphone amps to sell on etsy, this is tempting…
Im a security professional who works to harden medical devices. I use the flipper zero to easily test many different protocols that would be a pain in the ass to do “manually”.
The flipper makes it easy for me to verify IR, sub GHz, USB, SPI, and many other protocols while being able to walk around the devices I test.
Without the flipper I could totally do these checks with homebrew tools, a pi and an rtlsdr (unless thats gonna be illegal too?) But it would take me writing new tools and procedures rather than the ease of the flipper.
Anybody in the know can tell you that the hardware isn’t anything special, and like many others have said, its like making a swiss army knife illegal cause the toothpick can be used to pick a lock.
This isn’t gonna stop anybody, if pentest tools are showing flaws in your product, maybe we should send flippers to the car manufacturers and tell them to fix their shit. You shouldn’t be allowed to sell a car that can be wirelessly hacked like this, just like how the FDA doesn’t let you sell medical devices that can be hacked like that.
You don’t just put the cat back in the bag…
Based on your description it sounds like banning the flipper would be encouraging security throigh obscurity
I remember when they had the same conversations about packet sniffers.
Turned out the answer was to use encryption and switches.
My girlfriend has a medical implant for her gastroparresis. How concerned should we be? If that device shuts off, she can’t eat, and there’s only a handful of doctors in the country that can work on it, and the one that sees her is often booked two weeks out
The thing is, if there’s a wireless exploit/hack that can cause “patient harm” the FDA+Health Canada would force a recall the sec its publicly known.
The flipper wouldn’t be the only thing able to exploit it, anybody with a radio and some software would be able to. It just so happens the flipper can also do it cause its a swiss army knife and has a general purpose radio.
Generally by the time an attack exists on the flipper, its already been mastered on laptops and raspberry pis and stuff, putting it on the flipper is more to make it available to test easily without having to lug out the laptop. Nobody is inventing new exploits for such underpowered hardware as the flipper. People are porting known exploits to it.
I can’t say how concerned you should be, but this won’t make her any safer than before, equal risk. Just as likely someone with a laptop in a backpack doing that. We don’t make laptops illegal tho.
What I would be concerned about is the idea that the company that makes the implant would not be able to easily test for issues in the implant with such an “illegal” device. Yes they could use a laptop, but you don’t use an xray machine to find a stud, you use a handheld studfinder cause its cheap and easy.
Hope that helps explain a bit
the flipper wouldn’t be the only thing able to exploit it
No, and I never once thought these capabilities were unique to the Flipper. My concern is how much it lowers the barrier of entry to potentially dangerous behavior. When people say they got one “just to be evil”, it’s deeply concerning. If someone said the same thing about a gun, something else that can be dangerous and needs to be handled responsibly, I’d be notifying someone. It’s not the capabilities themselves, it’s how accessible it makes those capabilities to the otherwise-inept
Maybe cars should not be so easy to steal… I thought we came to an agreement on this.
I work for a company of under 100 employees in a small city. Our head IT guy bought a Flipper Zero with his own money so he could make sure our building key fobs couldn’t be easily copied.
If this guy can do it, I think the bajillion dollar auto industry can figure out a solution!
A single guy does not have 3 layers of managers and bosses above him, who have “better ideas”, costscutting policies and “i have no idea what you just explained to me, so lets just not do it!”.
Absolutely. I bet it’s just easier and cheaper for them to not bother securing their fob radio.
To be clear, I’m saying they should get their shit together as a company, because it’s clearly not a hard thing to fix.
So we can either have secure cars or late stage capitalism? Sounds like a worthwhile trade.
Yeah however how will the car companies make even more money?
The whole “these can be used for high scale crimes” argument is straight up fearmongering. One or two people have reverse engineered the remote protocol on one or two specific models of Volkswagen car, and, after listening to the car being locked and unlocked several times using a laptop and $500 SDR, can reconstruct a signal to unlock the car. When a cybersecurity professional figures out this is possible at all, it makes the news.
If your car can get broken into by any random script kiddie with a Flipper Zero, sue the car company for gross negligence.
Exactly. If the car can be broken into that easily, it’s the car company’s fault.
It seems like maybe the problem is that automakers were able to widely market vehicles that use wireless protocols that are relatively easy targets for attack. This was never properly secure.
Automakers should absolutely be held to higher standards (in general) than they are, and it’s not likely that banning specific devices is going to have any measurable outcome here. It’s pretty well known that people buy and sell malware, and people can just… make devices similar to a Flipper with cheaply and readily available hardware.
This is just dumb posturing to avoid holding automakers and tech companies accountable for yet another dumb, poorly thought out, design feature.
And obviously it doesn’t stop at cars. It seems pretty clear that snooping on any feature using RFID or NFC tech is only going to become more widespread. Novel idea: what about using… actual keys as the primary method of granting physical access? Lock picking is obviously possible but a properly laid out disc-detainer lock is pretty goddamn hard to bypass even with the proper tools, and that skill can’t just be acquired in the same way as with electronic methods of bypass.
Honestly, I am embarrassed with the whole “look like were doing something” shtick by my government. An expensive gathering of decision makers from various sectors, a National Summit, just to say: we are now gonna be soooo tough on crime and let’s ban the toy we just saw on TikTok.
Car theft was a major problem before 2010 until engine immobilizers became mandatory since 2007 on all vehicles made in Canada
Then everyone got too comfortable. The regulatory bodies and car manufacturers were too focused pretending doing some work and publishing all the buzzword-of-the-day “accomplishments” they were doing while patting each others backs without explicitely requiring manufacturers to comply/implement immediately anything. Meanwhile, manufacturers were happy to integrate almost off-the-shelf “children’s RC” car starter pack obfuscated through invisible/non-existent security and protected under dubious industrial secrets.
Obviously, criminals smelled the easy money. Starting around 2013 — mystery car unlocking device | 2015 — signal repeater car burglary, car thefts by relay attacks were known by automakers but ignored as one-offs, too technical, already dealt with by law enforcement to lets pretent it’s not that big of a problem or leave it to the police. Meanwhile, insurance claim replacement vehicles are selling like hotcakes and it is “convenient” to ignore the problem.
The following years various reprogramming theft become known and finally CAN bus injection — new form of keyless car theft that works in under 2 minutes or in depth investigation by Dr. Ken Tindell, becomes so easy, so cheap and widely available that even kids uses them to gain Youtube/TikTok followers.
Car hacking was a becoming serious concern during the pandemic, but now it’s simply ridiculous and as if current automaker included/provided anti-theft/GPS tracking were (un)knowingly made “defective”.
Hence, everyone is playing catch up and blaming left and right on who is responsible for this in-slow-motion public safety disaster.
Brian Kingston, president and CEO of the Canadian Vehicle Manufacturers’ Association, which includes Ford Motor Company of Canada, General Motors of Canada and Stellantis, said increasing the risk of prosecution is the most effective way to deter vehicle theft.
“And at the same time, providing more outbound inspection controls at the ports to prevent the flow of stolen vehicles to foreign markets by organized criminal organizations,” he added.
New vehicle safety standards have been published (rushed?) recently. We will see if all the panic settles down like after 2007.
Moreover, the exponential prevalence of car theft also laid bare the incredibly poor and ineffective security at the various ports of Canada. Unsurprisingly, it has been a known constant devolution:
Removed by mod
Oh right, forgot about this little thing. Had my eye it long time ago, but forgot about it. Thanks for reminding me Canada. Should probably read up on Streisand effect.
They are a fun little tool for hardware hacking and teaching yourself more about what it can do. I bought one last year.