▲ | boneitis 5 days ago | |
So to follow up on my misconceptions, the RollBack attack it is based on is now implemented on underground firmwares and is what is novel. The research itself too is fairly novel and was published in 2022, capable (at least, on paper) of rolling back the cipher state on the receiver, preventing de-sync (and is the crux of why this submission is amazing). The prior RollJam that I thought this was dates back to Samy's 2015 findings. It turns out 2015's RollJam (unlike RollBack) requires active interference and seems to necessitate the attacker being in the vicinity of both the remote and the receiver. |