What the fuck? They did a mistake implementing a half-assed protocol and it’s the end user that has to pay for it?
The “usb ignition” debacle didn’t teach anything to those assholes?
Also, wasn’t them that used a default passphrase in creating a SSL certificate for the CAN bus or something like that so everyone could reverse engineer that?
It was also them that sold engines with machining debris still inside. When the debris clogged up oil passages the crank became oil starved. The engine would then self-destruct.
This is some misleading reporting though, that same security flaw exists on all keyless vehicles, it’s not Hyundai specific. literally part of the article.
What the fuck? They did a mistake implementing a half-assed protocol and it’s the end user that has to pay for it?
The “usb ignition” debacle didn’t teach anything to those assholes?
Also, wasn’t them that used a default passphrase in creating a SSL certificate for the CAN bus or something like that so everyone could reverse engineer that?
edit: yes, it was them, they used multiple “encryption” keys by copying them verbatim from tutorials https://programmingwithstyle.com/posts/howihackedmycar/
CheapGPT> Make car, plz?
That last one sounds absolutely positive though
It was also them that sold engines with machining debris still inside. When the debris clogged up oil passages the crank became oil starved. The engine would then self-destruct.
They denied it was their fault for a long time.
That was a great read. Thanks for sharing
This is some misleading reporting though, that same security flaw exists on all keyless vehicles, it’s not Hyundai specific. literally part of the article.