Results 31 to 38 of 38
Thread: Onstar Remote Start
07-23-2012, 11:29 PM #31
- Join Date
- Mar 2007
- Grand Prairie, Texas
- Blog Entries
I'm not paranoid, I just dont trust anyone, especially our Goverment that has a bad habit of believing they can violate our rights and a simple "Oh were sorry" seems to make it all ok.
My wife wants her OnStar so thats fine with me, on my truck I choose not to have it.
07-24-2012, 06:15 PM #32
Needless to say, this caused considerable uproar and Onstar decided the possible revenue from 3rd party sales would not match the loss of revenue from service disconnections.
BTW, when you use Onstar for cell phone calls, the cost of having the phone number assigned to the vehicle is a cost that is billed to Onstar. The end-user (you and me) pays for the minutes used and not for the phone number. The longer Onstar keeps the phone number assigned to the car (after you have terminated your subscription), the more they pay, monthly, for phone service from the phone companies. A lot of front-end loading for data being sold to a 3rd party.
Look guys, the paranoia I am talking about is the fear that someone can listen to the conversations, inside the truck cab, without an actual Onstar call being placed, or received. All I was implying, is that we do not have that fear with our pocket cell phone, why would we have that fear with a car cell phone.Ray
'09 Avalanche LTZ - Black
'05 Envoy XL (sold)
07-24-2012, 06:51 PM #33
I activated the 3 month trial period on the 11, just to try it. I wont be renewing it. dont see the point, i have bluetooth for phone calls, and a garmin for directions.
remote start? mine came with it, why pay onstar for something I already have.
the vehicle data is easy to live without. nothing i cant check myself.
Last edited by Sierraowner5.3; 07-24-2012 at 06:56 PM.
2011 GMC Sierra SLE 5.3 Z71 4X4 Stealth Gray Metallic
Tow mirrors - Diablew Tuned - Flowmaster Regular 40 - Ready Lift 2.5' lift - BFG LT A/T K/Os - Carr Light Wing - TruckLite LED lights - Optima Red Top - 50% Front Window Tint - Line-X bedliner - Aidaid MIT - Tekonsha P2 - ARS Billet Grill
07-24-2012, 07:45 PM #34
When a cellular user dials a number on their keypad (be it a telephone number, a PIN, or a credit-card number), it is encrypted with CMEA in an attempt to protect the privacy of the user. CMEA is a symmetric cipher that uses a 64-bit key. A 64-bit key is usually considered to be fairly secure. However, flaws in the CMEA algorithm allow an attacker to predict portions of the key, reducing the effective key length to 24 or 32 bits, significantly shorter than the weak cryptography the US government allows for export. Herein lies the problem. A savvy computer user can break a 32-bit key on a typical home computer in a relatively short period of time.
This is not a new problem. As early as 1992, other researchers, including crypto pioneer Whitfield Diffie, revealed major flaws in the system's voice privacy features. The researchers are blaming broad underlying problems in the design process for the introduction of these flaws.
When the cellular industry was designing the privacy-enhancing features of the new digital cellular network, it received pressure from the National Security Agency to cripple the encryption capability of that network. The industry responded with an attempt to balance the NSA's concern over national security with consumers' desire for privacy by letting the cellular standards arm of the Telecommunications Industry Association design the architecture. It seemed like a reasonable compromise at the time.
Unfortunately, the TIA created a poor algorithm, and thousands of digital cellular users are now using it. How much of this is due to direct government intervention is unclear, but David Banisar, attorney for the Electronic Privacy Information Center, is ready to place the blame squarely on the NSA. "This is another illustration of how US government efforts to control cryptography threaten the security and privacy of Americans."
Cellular telephones, particularly the earlier analog models, have never been considered to be especially secure. In January, House Speaker Newt Gingrich learned this lesson the hard way, when a conference call he participated in was intercepted and leaked to the press.
Like Gingrich's call, most of today's cellular traffic can still be easily intercepted with widely available radio scanners. The new digital system does offer a good deal of protection over the older analog system, especially from casual listeners, but it has now been made clear that a determined eavesdropper with the proper technical expertise and resources can intercept communications on the new system. The losers in this whole debacle are the cellular users. With the old analog system, many users knew that someone could eavesdrop on their conversations. Now, they've been sold on the new, "secure" digital phones, and are using them with a false sense of security. When users believe their conversation are private, they could potentially say something they would not say if they believed it was possible to be intercepted by a third party. It is precisely this scenario that makes poor encryption (which includes weak encryption) more dangerous than no encryption at all.
2011 Silverado CrewCab 5.3L*Ram Air Look Cowl Induction Reflexxion Hood*6" Pro Comp Lift*Flowmaster Dual exhaust*Perfect Launch Rear Diff. Cover*Led Smoke Taillights*L.E.D.Smoke 3rd Brakelight*60" L.E.D. Tailgate Bar*Rearview Mirror Reverse Camera and Sensors*Smoke Headlight Covers*Front Bumper Grill Insert*Deezee Black Alum. Diamond Rail covers*20" Ultra Motorsports Rims wrapped with 35.5"B.F. Goodrich Tires*Inchannel Raingaurds*CAI*Bullydog GT Tuner*Alpine Amp*Boss 6x9's*Boston Acoustic Subs*Terrantula Tweeters*Custom Sub box*Red Led Interior Accents*5% Ultimacool duo tint rear window and doors, 20% front doors*Custom Vinyl Graphics*Demolded*Debadged*Painted drums and calipers*
Future Mods Include: Custom Interior Hydrographics, Electronic Rollup Toneau Cover, 4.56 Gears, Painted rear bumper
07-24-2012, 08:27 PM #35
Phantom, most of your data pertains to the old analog networks and the early digital networks.
The new generation digital network uses 3 security checks to ensure the integrity of the call:
- a subscriber authentication key
- a generated ciphering key algorithm
- and a PIN.
On top of that:
- the service provider maintains a data base of handset keys
- a data base of subscriber keys
- a data base of the handsets location
Some of the keys and some of the algorithms are stored in the handset, some on the network and some at the service provider's network office.
All three must be correct, without dups for the call to be made, or received, and all three must be correct for the call to continue. If there is any duplication from a 4th element (read hacker) the call will drop.
On top of that, the keys and the authentication can be changed through out the call, especially as the handset moves from tower to tower.
Yep, anything can be hacked, but, it ain't easy.
07-24-2012, 10:21 PM #36
07-25-2012, 11:06 AM #37
07-25-2012, 12:39 PM #38
By parts bot in forum Chevy Keyless Entry RemotesReplies: 0Last Post: 01-30-2012, 11:00 PM
By parts bot in forum Chevy Keyless Entry RemotesReplies: 0Last Post: 12-27-2011, 02:00 PM
By Steve in forum Chevy Keyless Entry RemotesReplies: 0Last Post: 11-02-2011, 11:50 AM
By Steve in forum Chevy Keyless Entry RemotesReplies: 0Last Post: 10-19-2011, 12:10 PM
By Perpendicular in forum Audio, Video & Gadget TechReplies: 12Last Post: 10-05-2009, 06:13 PM