• 0 Posts
  • 161 Comments
Joined 2 years ago
cake
Cake day: August 5th, 2023

help-circle
  • Technically, the other fob shouldn’t be affected if it works the way I think it does. There’s usually a maximum number of keys synced to the vehicle.

    This attack basically forces the key fob the flipper zero is substituting itself for to fall out of sync because the flipper zero doesn’t transmit the rollover response from the vehicle back to the key fob. So the F0 sends the rolling code it intercepted from the key fob to the vehicle. Vehicle is like, yep, that’s matches, and then it does it’s rollover and sends out the rollover response. The response doesn’t get back to the key because of range etc and then the key remains a step behind the vehicle in the rollover sequence from then on out.

    Technically I think they the key could potentially be resynced to the car. (My understanding is that a key of the correct type could be synced to any car that it can be programmed for so long as the key isn’t physically damaged, and the security module isn’t compromised with malicious code that would prevent it).


  • You:

    A. sought another third party out to verify your view of the situation (not including the people in this forum).

    B. have stated that you always end up feeling like the jerk in these interactions because they make you feel like you’re the one who did something wrong by “starting an argument with them when they agree with you”.

    C. made a post asking for the input of people who don’t know you, or this other person and don’t have the intimate details of the situation to get our take on what is happening .

    There seems to be an assumption here that gaslighting must be a deliberate act where the person doing it is aware of exactly what they are doing and why. That’s not really how it works though. There’s two parts to gaslighting and they’re pretty simple. The person who is doing it is trying to change the other person’s view of reality and somehow that change results in a payoff of some kind for that person.

    However I am willing to admit that there is the potential for something else to be going on here and several other people have brought up alternative POV’s that may be more relevant to your situation.









  • Lists. My notes app puts in work. I make lists for everything. I set alarms for everything. I write things down while I’m thinking about them because I will forget. I ask for things in writing because I will misremember what was said. I have a white board stuck to my fridge so that I can write down when we’re out of something or running low. Oh. And basketball nets over the hamper.









  • “Despite developers’ goal of delivering a product that works entirely as intended, virtually all software and hardware contain bugs.[7] If a bug creates a security risk, it is called a vulnerability. Vulnerabilities vary in their ability to be exploited by malicious actors. Some are not usable at all, while others can be used to disrupt the device with a denial of service attack. The most valuable allow the attacker to inject and run their own code, without the user being aware of it.[8] Although the term “zero-day” initially referred to the time since the vendor had become aware of the vulnerability, zero-day vulnerabilities can also be defined as the subset of vulnerabilities for which no patch or other fix is available.[9][10][11] A zero-day exploit is any exploit that takes advantage of such a vulnerability.[8]”

    That’s the definition straight from Wikipedia.



  • At the end of the tax year you generally receive tax documentation forms (a W2 or 1099 etc). These tax forms detail your taxable income and possibly any tax credits or exemptions you might be eligible for.

    You fill out I9 forms detailing your status (single married etc) and what dependants you have when you start at your place of work and then update those forms as that status changes over time. This information is used by your employer to withhold taxes on your earnings from your pay checks and send that money along to the federal and state governments as necessary.

    When you receive your end of year tax forms you enter that tax information into a tax preparation service or paper form, sign it and send it off with what you owe in check form to the IRS, unless you have made accurate tax withholding in which case you have already paid. If you are owed money by the government for overpayment of taxes they will then mail you a check or direct deposit the amount owed to you into an account of your choosing.

    There are exceptions if you own a business or have other forms of income for the tax year which you may have to submit a more detailed filing to the IRS with documentation that can absolutely include receipts. But for the most part you use the tax forms you receive to submit your taxable income calculations to the federal or state government and pay or get paid accordingly depending on if you owe them money, or if you are owed money by them for overpayment.