AndyW wrote:
They needed prolonged physical access to CREATE their exploit. As in, a vehicle they could reverse engineer to figure out how everything worked. Once created, they could hijack ANY similar model vehicle without physical access.
That is why this particular demonstration was novel - past vehicle hacks have all required physical access to the ACTUAL vehicle being hijacked.
Correct, if you read the entire Wired article you will note them IDing (via the vehicle's connection to Sprint's 4G network) additional vehicles that they could exploit via the same exploit.
These vehicles were physically remote and had never been accessed