I stand corrected. I didn't think of that. I was thinking of the remote key fobs with several buttons=20 on them. I totally didn't think of the ones you just need to have with you to start the car. I can see where this could take place. I apologize. Regards, Jim Regards, Jim > -------- Original Message -------- > Subject: RE: [EE]:: Wrapping key-FOBs in tinfoil > From: AB Pearce - UKRI STFC > Date: Mon, July 09, 2018 8:13 am > To: "Microcontroller discussion list - Public." >=20 >=20 > >It seems to me the only way the key fob is going to be able to be copied= is if someone > > presses one of the buttons to transmit the signal. If it is just sitt= ing on a table or > > hanging on a wall hook, how would someone outside the home (or bldg.) = cause the > > key fob to transmit? As far as I know, key fobs are not receivers. T= hey're only transmitters. > > So unless I'm missing something, I think the whole idea of copying th= e code from a key fob is a load of bull.=20 > =20 > No, it is not a lot of bull. If you need to insert a key into the steerin= g column to drive the car, then it is probably not a problem, but where the= problem starts is a lot of cars, especially high end ones (and these are t= he ones that seem to be targeted), are keyless entry and keyless operation,= you only need to have the fob in your pocket. This implies that the fob ha= s some sort of receive and respond mechanism so that when you walk up to th= e car it unlocks without you touching the fob, and when you get in you push= a button and the car starts - again without you touching anything on the f= ob. >=20 > So the guys in the article I posted the link to have some form of transmi= tter and receiver plugged into the laptop that sends a standard request as = though it comes from the car, and the fob in the house responds with the an= swer to the challenge. It doesn't matter that there is a fancy rolling code= , the laptop is powerful enough to generate this on the fly from whatever i= t gets back from the fob. An 'unlock' request is then generated by the lapt= op, the thieve climbs into the car and drives away with the laptop emulatin= g the left behind key. Thieves take vehicle to a lockup where they substitu= te the valid key codes for a new set of keys, ship vehicle out of country a= nd make lots of money. >=20 >=20 >=20 > --=20 > http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive > View/change your membership options at > http://mailman.mit.edu/mailman/listinfo/piclist --=20 http://www.piclist.com/techref/piclist PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .