Flipper Zero has been under scrutiny since Canadian officials last month claimed the company was to blame for a rise in car thefts in the country and proposed a ban on the popular (and cheap) penetration testing device.
This week, developers of multi-tools issue a statement argue on their website that they are unfairly singled out as the hacking boogeyman behind Canada’s car theft problem.They also urged internet users Sign the petition Condemned the proposed Flipper ban. “We believe proposals like this are harmful to security and slow down technological progress,” the post reads. “They are often made by people who don’t really understand how security works and won’t do anything to solve the problem of car theft.”
In February, the Office of the Minister of Public Safety of Canada Said it would investigate “All avenues for devices that steal vehicles by copying remote keyless entry wireless signals, such as the Flipper Zero, are prohibited.” The statement comes after a summit focused on “finding solutions to Canada’s growing auto theft challenge.” solution”. Canadian officials maintain that Flipper is one of the ringleaders of keyless car thefts in the country.
Meanwhile, Flipper Devices chief operating officer Alex Kulagin claimed the devices “cannot be used to hijack any car.” Flipper’s developers note on their blog that there are tools specifically designed to break into keyless car systems (so-called “signal repeaters”) that you can buy online for free. Such tools would intercept the signal sent by the car’s key fob and forward it to the hacker’s device, allowing remote entry and activation of the vehicle. Developers argue that Flipper, on the contrary, does not have the same computing power as these devices and is a less practical tool choice for such an endeavor.
Developers also emphasized an argument they have made before that government officials should be more interested in regulating the tech industry and making widely used software more secure, rather than punishing those who poke holes in industry defenses.
“These vulnerabilities must be fixed, not banned from cybersecurity tools that can find vulnerabilities in secure systems,” the statement read. “The cybersecurity industry has long recognized that bans do not fix insecure systems and only cause problems that people have already taken.” false impression of appropriate measures, thereby causing further problems.”