150 Million Ford Drivers – feeling safer

Auto, Gas Security Chips Vulnerable, Study Finds

Can’t we just stipulate that everything is breakable?

Update: Here is the overview of the procedure (from their website) -

We used some new special-purpose cryptanalytic techniques to reconstruct the algorithm used in the DST tags, by simply observing the responses that actual DST tags computed when presented with a large number of specially chosen challeneges. Using this black-box reverse-engineering method, we were able to implement a software program that, when given the same challenge and key as an actual tag, would compute the same response.

The good news – if somebody actually steals a car using these techniques, the suspect list will be extremely short ;-)