Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Denver news in your inbox
Catch up on the most important stories affecting your hometown with Axios Denver
Des Moines news in your inbox
Catch up on the most important stories affecting your hometown with Axios Des Moines
Minneapolis-St. Paul news in your inbox
Catch up on the most important stories affecting your hometown with Axios Twin Cities
Tampa Bay news in your inbox
Catch up on the most important stories affecting your hometown with Axios Tampa Bay
Charlotte news in your inbox
Catch up on the most important stories affecting your hometown with Axios Charlotte
Tesla Model S vehicles parked outside a car dealership in Shanghai. Photo: Johannes Eisele/AFP/Getty Images
Hackers can easily clone key fobs on Model S Teslas sold before June, according to researchers at KU Leuven university in Belgium.
The details: As the researchers outlined to Wired, the old key fobs used 40-bit encryption. "40-bit" describes the size of the cryptographic key used to secure the system. Each bit makes it exponentially more difficult to hack.
- To prevent an attack, owners of older Teslas can either now set their cars to require a PIN before starting or replace their fobs with the souped-up new one.
- 40 bits is not enough. The KU Leuven team reverse engineered Telsa's security system, and with the help of a few hundred dollars in technology, their technique can guess the key.
Be smart: If you have a Model S, set up a PIN or get a new fob.