The Tim Ferriss Show

#74: How a Computer Hacker Optimizes Online Dating, Opens Locked Cars, and Hijacks Drones

35 snips
May 2, 2015
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Demonstrate USB Trust Failures

  • Carry a tiny programmable USB device to demonstrate USB/keyboard trust failures quickly.
  • Use it to show how a keyboard device can execute commands and redirect network traffic in seconds.
INSIGHT

Toys Reveal Hidden RF Attack Surfaces

  • Cheap consumer toys can contain radio chips far more capable than intended and reveal unexpected attack surfaces.
  • Invisible wireless channels often feel safe, but they let attackers listen, replay, and emulate car/key signals.
ADVICE

Reverse Engineer RF Key Signals

  • Analyze radio transmissions over time to spot fixed and rolling components of key signals.
  • Compare repeated presses to identify per-car identifiers and determine if replay or rolling-code protections exist.
Get the Snipd Podcast app to discover more snips from this episode
Get the app