Going to need headlight locks.

Sorry, didn't know this is a repost...

 
This should have been thought of by car designers. Two near zero cost measures could be:
* End to end encryption between the key fob and the PCM. Everything on the Internet is considered vulnerable to malicious injection and man-in the middle attack, so applications use end to end encryption. Fob data is already encrypted on the radio, but they made the mistake of decrypting it before it reached a secure destination.
* CAN firewalls or separate buses for wiring in insecure areas of the car. In buildings such as libraries where Ethernet cables are exposed to be potentially attached to malicious devices, that segment of a network is considered a DMZ. This could be as simple as isolating peripheral parts of the CAN bus until after the car has been unlocked and started.
 
Last edited:
Just being lazy. Its never been done so dont spend a 20 million fixing this until after our lawyers take 100million.
 
If car mfg tighten security measures in CANBUS (again), would it post a new challenge on fixing your own vehicle? If every command is encrypted, what are we going to do for things like releasing electronic parking brake or resetting ECU learning through OBD port? :oops:
 
If car mfg tighten security measures in CANBUS (again), would it post a new challenge on fixing your own vehicle? If every command is encrypted, what are we going to do for things like releasing electronic parking brake or resetting ECU learning through OBD port? :oops:
They could find some way to disable all that until the car is "on".
 
Few days ago, I posted a video of Chrysler security module. In case you miss it.

With out knowing the Topology of the modules, I wonder weather this actually works.

 
Back
Top