Jak se kradou auta

How cars are stolen II.

The number of car thefts committed using the so-called key cloning is rising every year. At present, it is no longer unusual to read statuses on social networks about cars that have disappeared without a trace from lighted parking lots or in front of family homes. Vehicles of various types, brands and price categories are easy prey for thieves thanks to the comfortable keyless functions that we all enjoy.

But how is it possible that the perpetrator can steal a modern vehicle with a factory-installed immobilizer without any damage within a few seconds?

Cloning keys using an OBD socket

The OBD system is a diagnostic interface through which a service technician can read and edit data in control units located throughout the vehicle.

This very useful system has been installed as standard in most cars since 2001, enabling quick and easy fault diagnosis. However, it can be misused just as quickly and easily with a little help from a suitable reader or electronic diagnostics. These devices are also easily accessible thanks to the Internet, so buying them is a matter of a few clicks. With a similar device, obtaining immobilizer codes and loading a new key is a breeze for the offender, and your car is a thing of the past for you.

How will Pandora help you?

The very often used method of cloning keys was one of the main goals in the development of Pandora systems. To combat this threat, we have created a unique OBD port immobilizer, which is part of all Pandora models. If the vehicle is locked, the OBD port is not functional thanks to Pandora, so reading, diagnostics or any attempt to manipulate the socket is impossible. The only way to access the socket is to use a coded signal from the Pandora remote control. This technology, in conjunction with a unique Bluetooth identification tag, virtually completely prevents vehicle theft through misuse of the OBD socket.

Before that, however, the offender must open the vehicle and gain physical access to the OBD socket, without, of course, triggering a loud or silent alarm of normal security. However, there are several ways to overcome locks, and even if manufacturers try, perpetrators always try harder and there is no lock to stop them. After gaining access to the socket, all you have to do is connect a specialized device to the port and retrieve everything the offender needs from the stored data. Within a few seconds, the thief has a fully loaded key in his hand capable of completely controlling the vehicle. The perpetrator can take your car immediately, but often, for safety reasons, locks the vehicle and leaves. In a few hours or days, under perfect conditions, someone else will come for your car and you will be left with only eyes to cry.

Share it!