this post was submitted on 27 Mar 2024
938 points (99.4% liked)

Technology

58744 readers
4905 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] FiniteBanjo@lemmy.today 0 points 6 months ago

You responded to yourself, you know?

Before I even begin, none of this is more secure than non-paired parts because you can use a standard encryption on devices without physical pairing.

Now, you mention you are already aware of PCM, BCM, etc bypasses but you trust in the PATS. Here is how to work with those:

#4 is the Passive Anti-Theft System (PATS) transceiver electrical connector (part of 14401)

#5 is the PATS transceiver

Replacement is commonly done and the component that these are registered to is the Instrument Panel Cluster (IPC) which are commonly programed and hacked without permission from the manufacturer. Plus, most examples of PATS just disable the fuel injector, so you could bypass that in like 10min if you really wanted to. In fact, the only two parts paired in that example is the key to the PATS component because the PATS is not a paired part to the IPC, it's easily replaceable.