▲ | the_mitsuhiko 6 days ago | |||||||||||||||||||||||||||||||||||||||||||
That's more or less already how the rolling code based systems work. The problem of course is that if you have access to one of those keys (or use rolljam to get one or more codes) you have enough to get another key added. | ||||||||||||||||||||||||||||||||||||||||||||
▲ | fc417fc802 5 days ago | parent | next [-] | |||||||||||||||||||||||||||||||||||||||||||
That isn't the problem, at least not the major one that lead to this discussion. It's that the algorithm used is broken. It's example number 9001 of why you should never roll your own crypto for a commercial application. (Amusingly example 9002, TETRA radios, was also on the HN frontpage around the same time). | ||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||
▲ | IshKebab 5 days ago | parent | prev [-] | |||||||||||||||||||||||||||||||||||||||||||
Yeah exactly - requiring either an existing physical key, or an impractical rolljam attack is much better than what they have apparently implemented. |