Research shocker! Keyless car entry systems can be hacked easily, elegantly

We know you are vigilant enough not to trust your car’s security to a wireless system, but plenty of other folks like the convenience of putting away the metallic keys and getting into their vehicles with a bit of Bond-like swagger. Professor Srdjan Capkun of ETH Zurich found himself perched on the fence between these two groups when he recently purchased a vehicle with a keyless entry system, so he did what any good researcher would: he tried to bypass its security measures. In total, he and his team tested 10 models from eight car makers and their results were pretty conclusive: each of the tested vehicles was broken into and driven away using a very simple and elegant method. Keyless entry systems typically work by sending a low-powered signal from the car to your key fob, with the two working only when they’re near each other, but the wily Zurich profs were able to intercept and extend that signal via antennas acting as repeaters, resulting in your key activating your car even when it’s nowhere near it. The signal-repeating antennae have to be pretty close to both the key and the car, but that’s why heist movies stress the importance of teamwork. Hit the source link for all the chilling details.

Research shocker! Keyless car entry systems can be hacked easily, elegantly originally appeared on Engadget on Sun, 16 Jan 2011 19:07:00 EDT. Please see our terms for use of feeds.

Permalink CNET  |  sourceMIT Technology Review  | Email this | Comments

Geohot wins round one against Sony (kinda) — judge declines to rule on SCEA restraining order (updated)

By now we all know that Sony filed a lawsuit against Geohot and fail0verflow for their distribution of PS3 jailbreak firmware and asked the court for a temporary restraining order (TRO) to stop said distribution of the offending code. Well, according to Geohot, the court denied declined to rule on Sony’s motion earlier today. Geohot has reposted the code online, so it seems safe to say that the TRO is back for now, and the jailbreak can once again roam the internet unencumbered by any legal decrees. The decision, while favorable to the defendants, has little effect on the outcome of the litigation itself, so Hotz and company aren’t out of the woods just yet. We’ll keep you posted on the status of the order, and will also watch as the case progresses for the real fireworks to start.

Update: Looks like we jumped the gun and got the story a little wrong, but thanks to our readers we’ve discovered that the judge declined to rule on the TRO. Instead she tabled the TRO issue because she was not satisfied that the Northern District of California has jurisdiction to rule on the matter because Geohot hacked the PS3 in New Jersey.

Geohot wins round one against Sony (kinda) — judge declines to rule on SCEA restraining order (updated) originally appeared on Engadget on Fri, 14 Jan 2011 20:49:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceGeohot, Wired  | Email this | Comments

Sony asks for restraining order against Geohot, fail0verflow over PS3 exploits

We knew Sony would be non-plussed about the PlayStation 3 jailbreak, and now we have a better idea as to the full extent of its anger. The company has filed suit (not yet, see below) asked for a restraining order against George “Geohot” Hotz, the “hacking group” fail0verflow (Hector Cantero, Sven Peter, “Bushing,” and “Segher”), and numerous John / Jane Does over the exploit and its release. To be more specific, the company cites violations of Digital Millennium Copyright Act, the Computer Fraud and Abuse Act, various copyright infringements, and other acts of binary malfeasance. A temporary restraining order has also been sought, asking that all “circumvention tools” be taken offline and his computers and related media (i.e. anything storing said tools) be impounded. It looks like Geohot’s servers are being slammed at the moment, so we’ve gone ahead and hosted the relevant PDFs ourselves below. We’re still sifting through ourselves and will let you know what we unearth.

Update:
Nilay here — let’s take a look at what’s going on. This isn’t a “lawsuit” in the traditional sense, since Sony hasn’t filed a complaint for copyright infringement or whatever against Geohot and friends. Instead, the company appears to be trying to shove the genie back in the bottle and have the jailbreak and any information about the jailbreak removed from the web by filing a temporary restraining order. That might work in the short term — Geohot’s already pulled his pages down — but history suggests that the forces of paperwork rarely triumph over the righteous anger of nerds, and that this code is out there for good. That said, we’ll see what the court says tomorrow; although we very much doubt Sony’s melodramatic proposed motion and order will be granted as written, we wouldn’t be surprised if some sort of order is eventually granted — and then from there a formal lawsuit is likely just a few days away.

[Thanks to everyone who sent this in]

Sony asks for restraining order against Geohot, fail0verflow over PS3 exploits originally appeared on Engadget on Tue, 11 Jan 2011 21:35:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceGeohot  | Email this | Comments

‘Arduino The Documentary’ now available for your streaming pleasure

Over the years we’ve seen loads of Arduino hacks and mods — a DIY kit that lets plants tweet, a robotic iPhone, and even touchscreen GBA SP. All of these impressive, heartwarming and otherwise inspiring projects were made possible by the Arduino platform. Just in case you’re unfamiliar with what Arduino actually is, let us remind you that it’s an open source project geared toward students and other humans who wish to delve into the wild, wacky world of do-it-yourself electronics hardware and software coding. We’d encourage you to check out the documentary in full — you know, to get the skinny on the company’s inception and watch as the Arduino folks talk about their movement and its future — but we doubt you need our elbowing. Check out all 28 minutes of footage after the break.

Continue reading ‘Arduino The Documentary’ now available for your streaming pleasure

‘Arduino The Documentary’ now available for your streaming pleasure originally appeared on Engadget on Tue, 11 Jan 2011 19:42:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAdafruit  | Email this | Comments

Nexus S receives MeeGo and Ubuntu ports, makes our nerd senses tingle (video)

You’ve got to hand it to the Nexus S. In spite of being a souped-up smartphone, it’s still unpretentious enough to accept power from a BlackBerry microUSB cable and easy enough to hack that it’s just received not one, but two OS ports. MeeGo, in its very raw and unfinished form, has been dropped onto the phone’s internal memory without the need for any flashing, and the method has also been successfully used to install Ubuntu on the current Google flagship. There’s very little that’s actually functional about the MeeGo install at the moment, but the ball has begun rolling and there’s a resulting question that’s occupying our minds right now — will the Nexus S have a perfectly hacked copy of MeeGo before or after Nokia releases its device for the platform? Answers on a postcard.

[Thanks, Michelle and Brad]

Continue reading Nexus S receives MeeGo and Ubuntu ports, makes our nerd senses tingle (video)

Nexus S receives MeeGo and Ubuntu ports, makes our nerd senses tingle (video) originally appeared on Engadget on Tue, 11 Jan 2011 04:16:00 EDT. Please see our terms for use of feeds.

Permalink Techno Bolt  |  sourceHigh Caffeine Content  | Email this | Comments

PSP Go hacked to play UMDs, slightly increase its desirability (video)

For Sony, the homebrew community is both enemy and friend — at the same time hackers are exploiting the living daylights out of the PlayStation 3, they’re making the experimental PSP Go moderately interesting again. Here it is running UMD disc images directly from flash storage, letting it play games like Kingdom Hearts: Birth by Sleep, formerly off-limits since it was released on a physical disc. Sure, we’ve seen it play Sega CD games before, but this looks like the real deal — working, user-installable ISO loaders for PSP Go backups and homebrew. Not to mention the skull-and-crossbones-clad elephant in the room. Perhaps these aren’t exactly Sony’s friends, on second thought.

PSP Go hacked to play UMDs, slightly increase its desirability (video) originally appeared on Engadget on Fri, 07 Jan 2011 04:01:00 EDT. Please see our terms for use of feeds.

Permalink Ars Technica  |  sourceWololo (1), (2)  | Email this | Comments

Nook Color Bluetooth chip shows signs of life — if you’ve already hacked it, of course

You Nook owners just aren’t ever satisfied, are you? First, reading wasn’t enough so you went ahead and rooted to get your Angry Birds on. That was all fine and well, until that Froyo hack came along and (maybe?) nuked your device. If your confidence hasn’t yet been shattered, strap on your seatbelt for the latest chapter in the life of the Nook Color after e-reading. Apparently user occip over at the always-hacking xda-developers found a way to enable the currently dormant Bluetooth radio tucked away in some undisclosed cranny of B&N’s colorful Nook. This one’s not for the faint of heart just yet — you have to be on Froyo already, and that’s a feat in and of itself. Still, it paves the way for things like Bluetooth GPS dongles as well as headsets for apps like Skype. We’ll see what happens when B&N releases 2.2 officially, which should be pretty much any day now…

Nook Color Bluetooth chip shows signs of life — if you’ve already hacked it, of course originally appeared on Engadget on Tue, 04 Jan 2011 14:44:00 EDT. Please see our terms for use of feeds.

Permalink Review Horizon  |  sourcexda-developers  | Email this | Comments

Researchers eavesdrop on encrypted GSM call: all you need is a $15 phone and 180 seconds

It’s hardly a fresh idea — researchers have claimed that GSM calls could be cracked and listened in on for years. But there’s a difference between being able to do something with a $50,000 machine and a warrant, and being able to do the same thing with a few $15 Motorola phones, a laptop, open source software and 180 seconds of spare time. Security Research Labs researcher Karsten Nohl and OsmocomBB project programmer Sylvain Munaut recently spoke about a new GSM hack at the Chaos Communication Conference in Berlin, and they were able to walk the audience through the eavesdropping process in a matter of minutes. According to them, it’s not terribly difficult to use a $15 handset to “sniff out” location data used to correctly route calls and texts, and once you’ve nailed that down, you could use modified firmware to feed raw data into a laptop for decryption. Using a 2TB table of precomputed encryption keys, a cracking program was able to break in within 20 seconds — after that, you’re just moments away from recording a live GSM call between two phones. Of course, speeches like these are made to encourage security officials to beef up the layers between you and ill-willed individuals, but it’s hard to say what (if anything) will change. For now, we’d recommend just flying to each and every person you’d like to speak with. Unless you live in the Greater New York area — you’re probably better off risking a hacked conversation than heading out to LGA / JFK / EWR.

Researchers eavesdrop on encrypted GSM call: all you need is a $15 phone and 180 seconds originally appeared on Engadget on Wed, 29 Dec 2010 09:17:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceWired  | Email this | Comments

AMD Radeon HD 6950 can be turned into an HD 6970 using a BIOS hack

Ah, the joy of getting something for nothing — that’s what this time of year is all about, right? The techPowerUp! guys seem to think so, and they’ve got the perfect gift for all you thrifty PC gaming enthusiasts: a BIOS flash for the Radeon HD 6950 that unlocks the full potential of its hardware (in other words, it turns it into an HD 6970). We already knew the two retail SKUs were built on the same Cayman core, but this hack confirms that all the 6950’s performance handicaps have been enacted in software rather than hardware, leaving you all to flip a switch, click a few confirmatory dialogs, and get your game on. You should be aware that the retail 6970 card uses an 8-pin and a 6-pin connector for its auxiliary power whereas the 6950 only has a pair of 6-pin intakes, which might cause trouble under extreme loads, and there’s also the fact that you’ll most likely be hacking your warranty away together with your GPU’s limitations. But hey, you can’t make eggnog without cracking a few eggs.

AMD Radeon HD 6950 can be turned into an HD 6970 using a BIOS hack originally appeared on Engadget on Mon, 27 Dec 2010 04:19:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcetechPowerUp!  | Email this | Comments

Nexus S has been rooted, let the madness commence!

Our good friends at xda-developers haven’t kept us waiting long. Root access on the Nexus S has been achieved on the phone’s day of release, and full instructions for replicating it are available at the link below. The Nexus S is the proud and so far only carrier of Google’s latest and greatest Android software, so you’re basically getting unrestricted access to the very best Mountain View can offer. Hit that source link. Do it.

[Thanks, Brad]

Update: An Android team member has written in to remind us that the Nexus S, like the Nexus One before it, is designed with a user-unlockable bootloader out of the box — it’s not a magic trick. Good to know they’re keeping the tradition going.

Nexus S has been rooted, let the madness commence! originally appeared on Engadget on Thu, 16 Dec 2010 17:20:00 EDT. Please see our terms for use of feeds.

Permalink Redmond Pie  |  sourcexda-developers  | Email this | Comments