That’s interesting, never thought of that as an attack vector.
That’s interesting, never thought of that as an attack vector.
How would you set that pin on a SIM card in an iPhone?
So they took the SIM card out and got the phone number from that? I guess I didn’t realize you could do that.
I’m confused, in the article he said it was a brick to whoever has his stolen phone. How did they get his phone number to send him text messages? Did they crack the passcode and needed the iCloud password?
Wasn’t this done about 20 years ago. It’s called second life and there was big craze to get businesses in the game to pimp their stuff.
It was Confederated products. I loved that movie.
Wasn’t there a language created called Esperanto that was supposed to be the world language.
Don’t even try and format code with markdown, now you have to make a post with a title.
If you really want to read about it check out this novel
Milk is chillin, what more can I say.
Coballers - cobalt
Pascalleros - pascal
Actually you can find many videos on YouTube that show how to disable the OnStar transmitter and you can always wrap those internal antennae in foil.
Don’t forget Stanley Yelnats
I engage with my record player everyday. It plays wonderful music.
Yeah that book is great and I went on to DJ at many clubs and parties just to show my mother why you need two turntables.
Turntables and a mixer. When I was about 10 I saw Run-DMC on TV and wanted to learn to DJ, but my mother just laughed saying I already had a record player and they didn’t need to but me a second one.
Oh my bad, I was inferring that from the original article. Those articles you posted are good and talk about the CAN attack, but the original article talks about the rolling codes using a flipper zero like device.
Thanks!