Migrating here (or maybe keeping both) from @ArcaneSlime@lemmy.ml

Will put an eternal curse on your enemies for a Cinemageddon invite.

  • 0 Posts
  • 23 Comments
Joined 2 years ago
cake
Cake day: June 30th, 2023

help-circle










  • Unfortunately I can’t convince this to load, but Emo rules.

    My psychiatrist gave me a chocolate Easter bunny and I ate the bunny, but then I thought, "hey, this isn't Easter". "Is this a test?"
    
    And he said, "Yes."
    
    "And what does it mean?"
    
    He said, "Had you eaten the ears first you would have been normal. Had you eaten the feet first you would have had an inferiority complex. Had you eaten the tail first you would have had latent homosexual tendencies and had you eaten the breasts first you would have had a latent Oedipal complex."
    
    "Well...go on, what does it mean when you bite out the eyes and scream 'STOP STARING AT ME!!!?'"
    
    He said, "It means you have a tendency towards self-destruction."
    
    I said, "Well, what do you recommend?"
    
    He said, "Go for it!"
    

  • Tbh the point isn’t really the tamagotchi, it’s all the other stuff it can do (like control your TV lmao, among other things.)

    In fact most people immediately ditch the kneecapped OFW for something like momentum that lets you control the dolphin meter/your levels at will, and even use different asset packs or create your own animations (like me! I stole them from .gifs sure but I turned them into flipper anims!)

    Now, there’s other stuff that can do everything the flipper can do, and better, but typically not all on the same device. It’s a universal remote for both IR and SubGhZ that can also read/write RFID and NFC, run marauder, use badUSB incl with JS, and expand its uses with GPIO to do things like trade pokemon to my GBC. It’s definitely not magic but it is pretty sweet.








  • Of course, this particular attack actually “works” with rolling codes (WILL desync your real keyfob), it requires the attacker to sniff one signal off your key (incl lock) and then they can spoof your key’s rollover protocol (and any button, not just the one they sniffed) to reset the rolling code back to 0 and allowing them access. Iirc it’s different from a standard replay attack in (definitely) that it can spoof other keys on the fob it hasn’t read, and (I think) that while a trad replay attack requires the car not to hear the signal when recording I believe that doesn’t matter with this attack.

    Unfortunately I haven’t been able to test it out since I’m not buying a serial locked flipper firmware from some guy who just got out of prison selling it on telegram.