Open Jadmintor opened 5 years ago
As described in the README the car industry usually occupies on of the three methodologies for the remote vehicle unlocking. It's easy to visualize a replay attack and answer your own question. Think of the flow that the data has, from the key fob to the car lock and back. If a car and a key fob exchange data in a wireless manner capturing and sending these information at will (replaying) should be possible.
Do all remote cars get the technique of replaying attacks?