134
Canada declares Flipper Zero public enemy No. 1 in car-theft crackdown
(arstechnica.com)
What's going on Canada?
🍁 Meta
🗺️ Provinces / Territories
🏙️ Cities / Local Communities
🏒 Sports
Hockey
Football (NFL)
unknown
Football (CFL)
unknown
Baseball
unknown
Basketball
unknown
Soccer
unknown
💻 Universities
💵 Finance / Shopping
🗣️ Politics
🍁 Social and Culture
Reminder that the rules for lemmy.ca also apply here. See the sidebar on the homepage:
This is the best summary I could come up with:
Presumably, such tools subject to the ban would include HackRF One and LimeSDR, which have become crucial for analyzing and testing the security of all kinds of electronic devices to find vulnerabilities before they’re exploited.
This slim, lightweight device bearing the logo of an adorable dolphin acts as a Swiss Army knife for sending, receiving, and analyzing all kinds of wireless communications.
People can use them to change the channels of a TV at a bar covertly, clone simple hotel key cards, read the RFID chip implanted in pets, open and close some garage doors, and, until Apple issued a patch, send iPhones into a never-ending DoS loop.
The price and ease of use make Flipper Zero ideal for beginners and hobbyists who want to understand how increasingly ubiquitous communications protocols such as NFC and Wi-Fi work.
Lost on the Canadian government, the device isn’t especially useful in stealing cars because it lacks the more advanced capabilities required to bypass anti-theft protections introduced in more than two decades.
The most prevalent form of electronics-assisted car theft these days, for instance, uses what are known as signal amplification relay devices against keyless ignition and entry systems.
The original article contains 617 words, the summary contains 195 words. Saved 68%. I'm a bot and I'm open source!