Recently, the Canadian government made headlines by announcing a ban on the import, sale, and use of the Flipper Zero device. Despite this decision, the developers of Flipper Zero have responded, stating that such actions could potentially harm security measures and impede technological advancements. They believe that lawmakers have misunderstood the true functionality of the device.
The ban was explained by Canadian authorities citing concerns over the device being used for car thefts specifically targeting vehicles with non-lock access systems. However, many users online have argued that the issue lies more with the outdated security measures of the cars themselves rather than the gadgets.
To fully comprehend the issue at hand, it is important to understand how these non-lock access systems work and how thieves are able to bypass their protections. Car thefts using repeaters involve tricking the car into believing the key is nearby. Specialized devices costing thousands of euros are required for this type of attack.
Contrary to popular belief, Flipper Zero, which can detect and decode radio signals, is not capable of being used as a repeater for attacks on non-lock access systems due to its limitations. The gadget only has one radio module with a frequency up to 1 GHz and cannot breach the complex encryption used in modern cars. Additionally, modern cars often utilize a generated code system for added protection, making theft using simple radio modules nearly impossible.
In response, the Canadian Repair Coalition has urged the government to gain a deeper understanding of technologies and avoid simplistic solutions like device bans without fully grasping their functions and benefits. The developers have even shared a video demonstrating the interception of radio signals using a piece of cable.
The developers are advocating for support for a petition against the ban of Flipper Zero, arguing that such actions hinder innovation and security, providing a false sense of safety. They emphasize the need to address security issues through technological advancements and fixing existing vulnerabilities rather than relying on measures that only identify them.