The tech used here is the popular Flipper Zero, an ethical hacker’s swiss army knife, capable of all sorts of things such as WiFi attacks or emulating NFC tags. Now, 404 Media has found an underground trade where much shadier hackers sell extra software and patches for the Flipper Zero to unlock all manner of cars, including models popular in the U.S. The hackers say the tool can be used against Ford, Audi, Volkswagen, Subaru, Hyundai, Kia, and several other brands, including sometimes dozens of specific vehicle models, with no easy fix from car manufacturers.
That’s probably debatable, if they have permission. They probably shouldn’t have been given permission, but that’s a separate issue
Ideally, there should be a visitor card available to be used, with its clearances configured as appropriate for the visitor in question. Having a person hand over their own card (and PIN, if applicable) isn’t a great idea either, but it’s far better than copying that card, with or without permission (probably without, if we’re being honest).
Oh, absolutely. It’s not something which should be encouraged, and against a well designed modern system it probably isn’t possible (there must be some challenge-response type NFC systems on the market).
I’m just saying it isn’t unambiguously “illegitimate”
There are. Hotels use them for door key cards so they can’t be cloned.
Unfortunately… I was trying to clone a room key to my phone so I could just tap to enter when I stay 10 weeks in the same room.
I usually do it when we take over a customer’s access control system and we we have half their doors on the new system and half in the old still and are migrating them over. I’m an electronic security tech, this is what I do for a living.