I was at DefCon last year, and there were definitely Flipper Zeros in
use - but little joy to be found from them.
There was a Tesla Y and a Nissan Leaf - both with company reps there
(keeping the hackers from cutting wires or metal).
I would be quite surprised if someone were able to hack in
Tesla allows users to setup a 4 digit security code that must be entered to
use drive mode.What's nice if you hope out of the car and back in even the
thought the tesla did not fully shut off you need to re-enter the code so if a
bad guy yanked you out of the car and then tried to drive off
My flipper zero is still en route, so I can't say for sure, but my reading of
radio specs and capabilities is that anything subject to "attack" by the FZ is
badly designed or incorrectly implemented.
This is not to say that people don't do questionable things with it, but as a
long time
This is a very low probability vulnerability. Obviously always be careful
where you enter credentials.
On Fri, Mar 8, 2024 at 1:14 PM Robert Johnston via EV
wrote:
> It's a common man-in-the-middle attack, and you don't need a Flipper Zero
> to do it, any PC, laptop, even a cellphone could do
Sounds like the person who wrote the article didn't do his/her homework... and
that David doesn't know some of Tesla's security enhancements.
Whenever a new driver is added to the Tesla app and is given potential control
of the car, in this case the 'thief', the app lists the new driver, in this
It's a common man-in-the-middle attack, and you don't need a Flipper Zero
to do it, any PC, laptop, even a cellphone could do the same. See also:
Phishing attacks at coffee shops and the like.
On Fri, 8 Mar 2024 at 13:57, EV List Lackey via EV
wrote:
> The subject line is a bit frivilous, but