A new and custom firmware for the popular Flipper Zero multi-tool device is reportedly capable of bypassing the rolling code security systems used in most modern vehicles, potentially putting millions of cars at risk of theft. Demonstrations by the YouTube channel “Talking Sasquach” reveal that the firmware, said to be circulating on the dark web, […] The post Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands appeared first on Cyber Security News.

  • friend_of_satan@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    9 days ago

    I have a flipper. I still don’t understand why this could not be an app.

    What feature exists in this firmware that does not exist in the standard flipper firmware?

    • 50MYT@lemmy.world
      link
      fedilink
      English
      arrow-up
      17
      ·
      8 days ago

      The new firmware expands the band range of the device.

      By default it’s limited to prevent this.

    • Scipitie@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      ·
      8 days ago

      The flipper tries hard to stay “legal”, respecting all kind of frequency limits - just like you need to use a different firmware for your wifi AP if you want to go beyond legal frequencies for your network.

    • GrumpyDuckling@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      8 days ago

      Without knowing how it works, my best guess is that the micro controller and the radio chip are separate so they are flashing the radio controller and not the main part. I did that with my sonoff 433mhz gateway. I installed Tasmota but the codes it could read were limited. I then flashed the 433mhz radio chip with a different firmware which can read all raw codes on that frequency.