krellor

joined 1 year ago
[–] [email protected] 2 points 8 months ago* (last edited 8 months ago)

Hey, sorry it took so long to see your question. Here is a paper (PDF) on the subject with diagrams.

https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/42365/eth-4572-01.pdf

The link is composed of two parts, the emitter and the receiver. The emitter captures the LF signal and up-converts it to 2.5 GHz. The obtained 2.5 GHz signal is then amplified and transmitted over the air. The receiver part of the link receives this signal and down-converts it to obtain the original LF signal. This LF signal is then amplified again and sent to a loop LF antenna which reproduces the signal that was emitted by the car in its integrity.

Edit: and here is a times article that covers the problem in one area. https://www.nytimes.com/2024/02/24/world/canada/toronto-car-theft-epidemic.html

[–] [email protected] 5 points 8 months ago (2 children)

Yeah. Shockingly people store things where it is convenient to have them. :) I'm glad I didn't have a keyless system to with about.

[–] [email protected] 4 points 8 months ago

I did read the article. I'm unfamiliar with the "hacking" tools or methods they mention given they use terms like emulator. I was simply sharing one wireless attack that is common in certain areas and why.

[–] [email protected] 8 points 8 months ago (8 children)

I think most of the wireless attacks aren't trying to be so sophisticated. They target cars parked at home and use a relay attack that uses a repeater antenna to rebroadcast the signal from the car to the fob inside and vice versa, tricking the car into thinking the fob is nearby. Canada has seen a large spike in this kind of attack. Faraday pouches that you put the fob inside of at home mitigates the attack.

[–] [email protected] 3 points 8 months ago (4 children)

I'm not sure about what the article is referencing, which is probably a little more exotic, but relay attacks are very common against keyless cars. Keyless cars are constantly pinging for their matching fob. A relay attack just involves a repeater antenna held outside the car that repeats the signal between the car and the fob inside the house. Since many people leave the fob near the front of the house, it works and allows thieves to enter and start the car. Canada has has a big problem with car thieves using relay attacks to then drive cars into shipping containers and then sell them overseas.

[–] [email protected] 34 points 9 months ago (1 children)

I need to start using old batteries in my bathroom scale.

[–] [email protected] 4 points 10 months ago

Thanks for the article, it was a fun read. I'll have to go back and re-read the majority opinion because I do remember some interesting analysis on it even if I disagree with the outcome.

[–] [email protected] 10 points 10 months ago (2 children)

While not related from a legal standpoint, the use of iPhones and intermediate devices reminds me of a supreme Court case that I wrote a brief about. The crux of it was a steaming service that operated large arrays of micro antenna to pick up over the air content and offer it as streaming services to customers. They uniquely associated individual customers with streams from individual antenna so they could argue that they were not copying the material but merely transmitting it.

I forget the details, but ultimately I believe they lost. It was an interesting case.

[–] [email protected] 3 points 10 months ago

Ants are the OG cooperative agent algorithms. Simulating ants use of pheromones to implement stigmergy path finding is a classic computer science algorithm.

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago) (1 children)

I'll give you some general advice and am happy to answer any follow up questions you might have.

Upfront, I recommend getting a laptop from a well known vendor running Windows. If you aren't looking to go on a technology learning expedition, just need something that will work, and will have a warranty and a support line if things go wrong, you can't beat a vendor. Dell is probably where I would look, but Microsoft surface, and Thinkpad's are also good.

Going with Windows from a vendor supplied laptop will maximize the amount of support you have and the number of things that just work.

If you are looking for more of a technology project, I'd need to know more about what your tolerance is for fiddling with technology or your computer not working.

As for CAD, as others said, check the recommended software specs and match your computer to them. Make sure you give yourself plenty of fast storage like m.2.

For browsers, I use Firefox. I'd recommend Firefox as being a good balance between privacy and just working with plugin support. But chrome and other chromium based browsers like edge also just work.

Consider getting a Microsoft 365 personal or family account. For $100/year you get cloud storage, computer backups, and the local and online office suite, and it all integrates well into Windows.

If any of the above assumptions are wrong, I'm happy to update recommendations.

Finally, how do you learn to fish? It takes time to come up to speed on things, so slowly learning, finding neutral review sites like maybe Tom's hardware, and doing your own testing.

Lots of people will give you opinionated advice, so don't be afraid to be skeptical. Think about what's important to you, whether that be just working, or privacy, or availability of support materials.

[–] [email protected] 0 points 10 months ago (1 children)

I love that your post gave a probabilistic binning of someone who doesn't have a traditional social media account, which was unironically confirmed by people replying with rustled jimmies.

Come on folks, it should be clear from context that she is saying that a single woman setting up dates is going to use what limited info they have to avoid stalkers, cheaters, red pillers, and anti social people. That this might filter out perfectly normal people along with the creeps is the cost of maintaining safety and not wasting time, which is pretty much par for the course in dating. There's also a difference between exchanging info after a brief meeting, and actually knowing a person for an extended time and then dating. I doubt OP is saying that someone they studied with for three semesters would be excluded for lack of social media, because they have real life context and don't need the proxy filters.

Also, getting real close in these replies to "but I'm a nice guy" and "I'm not like other girls."

[–] [email protected] 1 points 10 months ago

In that case, never mix business and family. 😂

view more: next ›