B
bud--
Guest
On 12/28/2022 10:38 PM, chop wrote:
\"at the time the theft takes place\"
You have not read the cited source or it is too difficult for you to
understand.
When the scheme is being run it gets a \'fresh\' rolling code from an
authorized fob and sends it to the car.
Everyone seems to understand but you.
On Thu, 29 Dec 2022 14:31:21 +1100, bud-- <null@void.com> wrote:
On 12/28/2022 8:52 PM, chop wrote:
On Thu, 29 Dec 2022 10:47:07 +1100, Scott Lurndal
scott@slp53.sl.home> wrote:
micky <NONONOmisc07@fmguy.com> writes:
---- Except, how isthere any signal to pick up unless you are in your
home pressing the Unlock button on the fob at the same time the thief
drives by? I myself dont\' bother pressing fob buttons once I\'ve
left
the car, until I want to drive away the next day.
The key fob and the vehicle routinely \"ping\" each other when
in range. This is what allows mere possession of the key
to allow one to unlock the trunk, or fuel filler cover without
any button push on the remote.
The evesdropper can simply \"overhear\" the ping and use the data
to capture the necessary bits of the protocol.
Not with a rolling code system.
If you read
https://www.moneyshake.com/car-finance-guides/road-safety/how-to-protect-keyless-entry-cars
\"How do keyless car thefts work?\" (in the first post)
the method gives the car the code from a legitimate fob at the time
the theft takes place.
That isn\'t possible with the rolling code system.
\"at the time the theft takes place\"
Rolling code? That is the code the car gets.
But it is different every time, that\'s where the name ROLLING comes from.
You have not read the cited source or it is too difficult for you to
understand.
When the scheme is being run it gets a \'fresh\' rolling code from an
authorized fob and sends it to the car.
Everyone seems to understand but you.