Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
kilburn
10 months ago
|
parent
|
context
|
favorite
| on:
Assignment 5: Cars and Key Fobs (2021)
There's no car identification in this protocol, meaning that impersonation/mitm attacks are trivial. Try again :)
bufferoverflow
10 months ago
[–]
I don't see it. Give an example of how this attack can be executed, a practical application.
I approach my car, I press the button on the fob to open it, and your attack does what exactly?
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: