▲ | boneitis 6 days ago | |
Assuming it doesn't do anything else magical, I don't see much point in dignifying it with a web hit, let alone finding out its name. It's odd to throw in the dark web, thousand dollar firmware bit when third-party firmwares are developed in the open and have long ago already implemented KeeLoq, but I guess they aim for sensationalism and shock value. | ||
▲ | boneitis 5 days ago | parent [-] | |
So to follow up on my misconceptions, the RollBack attack it is based on is now implemented on underground firmwares and is what is novel. The research itself too is fairly novel and was published in 2022, capable (at least, on paper) of rolling back the cipher state on the receiver, preventing de-sync (and is the crux of why this submission is amazing). The prior RollJam that I thought this was dates back to Samy's 2015 findings. It turns out 2015's RollJam (unlike RollBack) requires active interference and seems to necessitate the attacker being in the vicinity of both the remote and the receiver. |