Welcome to Tesla Motors Club
Discuss Tesla's Model S, Model 3, Model X, Model Y, Cybertruck, Roadster and More.
Register
  • We just completed a significant update, but we still have some fixes and adjustments to make, so please bear with us for the time being. Cheers!

Video of a Model S being stolen in the UK

edlin303

Member
Jan 29, 2018
103
110
San Diego
I really like the idea of hiding a tile in the car. I always struggled to think of use cases for them that would help me, and that one seems pretty clever.
 

berkeley_ecar

S 90D (fully loaded) delivered 18 Mar 2017
Jul 21, 2014
249
209
Berkeley, CA
Wouldn't have helped in this case as the thieves used a relay which makes the owners keyfob talk to the car as if the keyfob was beside the driver door.
Ah, yes, a relay attack -- so the solution is to store the key at a substantial distance from the car, or (better yet), keep the fob in a RF-blocking container such as a small metal box?. The longer-key-length fob is still a good idea for the decryption attack that has been successful in Europe, no? A bluetooth tile is going to be useless for tracking.
 

Jhelin

Member
Jun 22, 2018
50
60
Sweden
Ah, yes, a relay attack -- so the solution is to store the key at a substantial distance from the car, or (better yet), keep the fob in a RF-blocking container such as a small metal box?. The longer-key-length fob is still a good idea for the decryption attack that has been successful in Europe, no? A bluetooth tile is going to be useless for tracking.
Yep, RF-blocking container or PIN to drive or turning passive entry off would have thwarted these thieves.
 
  • Like
Reactions: MP3Mike

KArnold

Member
May 21, 2017
497
489
Columbus OH
Wouldn't have helped in this case as the thieves used a relay which makes the owners keyfob talk to the car as if the keyfob was beside the driver door.

As I understand the hack, they still have to decrypt the old 40-bit key to relay which is not hard to do with a "rainbow table" of sorts. If so, the 80-bit encryption seems like it would help immensely. Do I not understand this hack correctly?
 
  • Disagree
Reactions: MP3Mike

brkaus

Well-Known Member
Jul 8, 2014
7,633
6,163
Austin, TX
As I understand the hack, they still have to decrypt the old 40-bit key to relay which is not hard to do with a "rainbow table" of sorts. If so, the 80-bit encryption seems like it would help immensely. Do I not understand this hack correctly?
This particular “hack” doesn’t do any decoding. It is amplifying/relaying the existing codes.

The 40 v 80 bit hack that used the rainbow table was effectively making a clone of the key that could be used anywhere.
 
  • Like
Reactions: MP3Mike and Jhelin

KArnold

Member
May 21, 2017
497
489
Columbus OH
This particular “hack” doesn’t do any decoding. It is amplifying/relaying the existing codes.

The 40 v 80 bit hack that used the rainbow table was effectively making a clone of the key that could be used anywhere.

They may still be trying to determine the details. But in looking at one site - Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob - it seems to imply the 80-bit decryption is required and more problematic. No?

...They can then run that pair of codes through their hard drive's table to find the underlying secret key—which lets them spoof a radio signal that unlocks the car, then starts the engine....That whole attack chain, the researchers say, is possible thanks to the Pektron key fob system's relatively weak encryption....Based on the research presented by this group, we worked with our supplier to make our key fobs more secure by introducing more robust cryptography for Model S in June 2018.
 

iCharge

Member
Jul 30, 2018
248
69
New England
@mods Thanks for merging.

I think the message is pretty clear, use that PIN, how ever old school it may sound, it works.
And strongly consider turning off Passive Entry.

its really a dance of security vs convenience, same as what we witnessed in the smartphone industry.
 
  • Like
Reactions: .jg.

brkaus

Well-Known Member
Jul 8, 2014
7,633
6,163
Austin, TX

iCharge

Member
Jul 30, 2018
248
69
New England
This particular “hack” doesn’t do any decoding. It is amplifying/relaying the existing codes.

The 40 v 80 bit hack that used the rainbow table was effectively making a clone of the key that could be used anywhere.
to me 40 vs 80 is moot point, why add extra cost to an item when user is not using existing features .
see above
 

iCharge

Member
Jul 30, 2018
248
69
New England
100% agree with you. The 80 bit key fob is better and harder to clone. But the clone process is not what they used in this particular theft, or at least it does not look like it to me.
you are correct, this is relay attack, like someone said above, akin to forwarding your mail. dont need to open to forward
 

About Us

Formed in 2006, Tesla Motors Club (TMC) was the first independent online Tesla community. Today it remains the largest and most dynamic community of Tesla enthusiasts. Learn more.

Do you value your experience at TMC? Consider becoming a Supporting Member of Tesla Motors Club. As a thank you for your contribution, you'll get nearly no ads in the Community and Groups sections. Additional perks are available depending on the level of contribution. Please visit the Account Upgrades page for more details.


SUPPORT TMC
Top