Yet again, a year hasn’t passed yet and Tesla is stuck in the mud with its revised keyless entry key fob. Tesla last year suffered from a hacker who was able to clone the keyless entry system and eventually get access to drive away in a car without ever touching the owner’s key. and this just happened again. Tesla did revise its encryption software and supposedly patched the original flaw, but it happened again. During the Cryptographic Hardware and Embedded Systems conference in Atlanta, technology and software researcher Lennert Wouters of Belgian university KU Leuven announced that his team was able to yet again hack the newly revised Tesla encryption on their Model S’ key fob.
Lennert did mention that the attack was slower than the previous attempt, but still took full control of the vehicle within seconds; although they never actually drove off with the car. He just wanted to prove its possibility.

Encryption is very complicated to break into; however, poorly designed ones are a lot more vulnerable than imagined. Researchers and hackers can still break into a system if the software lacks the proper keys to its full security potential. Tesla took the initial threat very seriously and did patch the software, and now they did the same. They acknowledge the error and are pushing out a software release to patch the open doors to their encryption.