• conciselyverbose@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    9 months ago

    This seems a lot more complicated and much worse than just using actually cryptographically secure keys to verify that it’s the real key.

    • Ledivin@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      5
      ·
      edit-2
      9 months ago

      Or just not storing your key where it can be repeated 🤪 this attack is 100% mitigated by some distance or just fuckin’ aluminum foil.

      • piecat@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        9 months ago

        Sure, you could and probably should do that. But is that something the consumer should have to do?

        At what point is a design flaw/defect the consumer’s responsibility?

      • Calcium5332@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        2
        ·
        9 months ago

        You would need to put your keys in a faraday cage.

        Distance doesn’t matter, as they can just use a bigger antenna or better amplifier. You find footage of people using large loops of wire to capture the signal from the keys