RCU Forums - View Single Post - Another Drone Pilot does it Again
View Single Post
Old 10-27-2016 | 11:00 AM
  #3958  
Sport_Pilot's Avatar
Sport_Pilot
 
Joined: Jan 2002
Posts: 16,916
Likes: 0
Received 1 Like on 1 Post
From: Acworth, GA
Default

Originally Posted by N410DC
Wow, first we get multitudes of reports regarding DSM-2 reliability, and now this.

IT firms and hackers often play a ongoing cat-and-mouse game. The firm develops a "secure" technology, a hacker finds a hole, and the firm fixes the problem. Granted, a fix to DSMX, if it does wind up being easy to hack, might require replacement receivers and/or transmitters, rather than inexpensive firmware upgrades.

My question is this: how easy is it to implement this exploit? Is it something that a kid could do in their basement after watching a YouTube video, or will it require more siphociated expertise? Based on what the article said, the components that are needed are fairly easy to come by, and not too expensive.

Another question is whether or not this exploit could be adapted to the other protocols, such as FASST, ACCST, etc.
I would think you need a DSMX chipset, but you could borrow that from a transmitter. I don't see it a big issue. It's like so what?

Folk's they are toys, not as dangerous as a full scale vehicle at all!