Remix.run Logo
karel-3d 6 days ago

Because the original hacker is selling the firmware for 1000 USD on dark web marketplaces.

It's literally being sold on dark web. People call everything "dark web" but this time it's correct.

gear54rus 6 days ago | parent [-]

So what's the search term for it at least? This stupid gatekeeping while racking views and hype from it is getting on my nerves.

mbirth 3 days ago | parent | next [-]

From the comment under the article and the link to the YouTube video, the firmware seems to be called “Flipper Zero Unleashed”. Seemingly available via Telegram.

boneitis 6 days ago | parent | prev [-]

Assuming it doesn't do anything else magical, I don't see much point in dignifying it with a web hit, let alone finding out its name.

It's odd to throw in the dark web, thousand dollar firmware bit when third-party firmwares are developed in the open and have long ago already implemented KeeLoq, but I guess they aim for sensationalism and shock value.

boneitis 5 days ago | parent [-]

So to follow up on my misconceptions, the RollBack attack it is based on is now implemented on underground firmwares and is what is novel. The research itself too is fairly novel and was published in 2022, capable (at least, on paper) of rolling back the cipher state on the receiver, preventing de-sync (and is the crux of why this submission is amazing).

The prior RollJam that I thought this was dates back to Samy's 2015 findings. It turns out 2015's RollJam (unlike RollBack) requires active interference and seems to necessitate the attacker being in the vicinity of both the remote and the receiver.