Originally Posted by
N410DC
Wow, first we get multitudes of reports regarding DSM-2 reliability, and now this.
IT firms and hackers often play a ongoing cat-and-mouse game. The firm develops a "secure" technology, a hacker finds a hole, and the firm fixes the problem. Granted, a fix to DSMX, if it does wind up being easy to hack, might require replacement receivers and/or transmitters, rather than inexpensive firmware upgrades.
My question is this: how easy is it to implement this exploit? Is it something that a kid could do in their basement after watching a YouTube video, or will it require more siphociated expertise? Based on what the article said, the components that are needed are fairly easy to come by, and not too expensive.
Another question is whether or not this exploit could be adapted to the other protocols, such as FASST, ACCST, etc.
I would think you need a DSMX chipset, but you could borrow that from a transmitter. I don't see it a big issue. It's like so what?
Folk's they are toys, not as dangerous as a full scale vehicle at all!