Anyone have thoughts on whether this is security theater or done right?https://twitter.com/DesignSHIFT2010/status/772630390553120768 …
That's why the keyfob is used and communication timed to prevent relaying through a fake device.
-
-
That relies on the attacker not remaining relatively close. Swap the hardware and wait outside in a van?
-
There's already an assumption that they're breaking into a building to mess with the hardware, since this isn't a mobile device.
-
They could potentially keep the real device nearby with the relaying set up, and then come to retrieve it later. Just a thought.
-
It doesn't really seem like they *have* to swap out both the key fob and the device in order to compromise something like this.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.