top | item 41662761

(no title)

wallaBBB | 1 year ago

Regarding the Kia Boyz - immobilizers have been mandatory in most of Europe since late 90s, in Canada since 2007. Basically there is something to put on (lack of) regulations as well as on HKMC.

discuss

order

Sohcahtoa82|1 year ago

In the USA, we believe we don't need regulations, the Free Market(tm) will punish corporations that don't behave in a way that benefits their customers!

Insane to me that so many people believe this...

beerandt|1 year ago

The problem isn't that we need better locks, but that we need locks at all.

Within my lifetime we've gone from leaving the backdoor unlocked at night and leaving the car keys on the seat (or in the ignition) from being the normal practice to being unthinkable.

You're focusing on the wrong govt policies.

throw10920|1 year ago

Citation needed for the claim any significant fraction of the US population believe that regulations are completely unnecessary.

This runs directly contrary to my lived experience here, so unless you can provide evidence it sure seems like you're just stereotyping an entire nation to engage in ideological warfare.

op00to|1 year ago

I’ll certainly never buy another Korean car.

vasco|1 year ago

From my understanding immobilizer bypass tools are cheap and plenty.

acdha|1 year ago

Even if that’s true, they are clearly nowhere near as “cheap and plenty” as watching a Tik Tok video. The spike in crime was far greater than normal random variation.

wallaBBB|1 year ago

Not really. At least not for those immobilizers that don't use "proprietary" ciphers. Automotive loves security through obscurity until it bites them in the ass. Today most manufacturers have moved to AES128, which is not cheap to brute force, especially if there is a rolling code (should be the case for many)

But you are right that there are many (older models) that use ciphers with know quick exploits: TI's DTS40/DTS80 (40/80bit, proprietary cipher, in many cases terrible entropy), models from Toyota, HKMC, Tesla. About 6s to crack in many cases.

NXP's HTAG2 - most commonly used one in the '00s - 48bit proprietary cipher, a lot less exploited in the wild than the TI's disastrous two variants.