• Wispy2891@lemmy.world
    link
    fedilink
    English
    arrow-up
    33
    ·
    edit-2
    4 days ago

    What the fuck? They did a mistake implementing a half-assed protocol and it’s the end user that has to pay for it?

    The “usb ignition” debacle didn’t teach anything to those assholes?

    Also, wasn’t them that used a default passphrase in creating a SSL certificate for the CAN bus or something like that so everyone could reverse engineer that?

    edit: yes, it was them, they used multiple “encryption” keys by copying them verbatim from tutorials https://programmingwithstyle.com/posts/howihackedmycar/

    • Mike D.@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 days ago

      It was also them that sold engines with machining debris still inside. When the debris clogged up oil passages the crank became oil starved. The engine would then self-destruct.

      They denied it was their fault for a long time.

    • kameecoding@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      4 days ago

      This is some misleading reporting though, that same security flaw exists on all keyless vehicles, it’s not Hyundai specific. literally part of the article.