Anyone With $100 Can Watch Your Daily Routine Thanks to Your Car’s “Safety” Feature

Researchers used $100 radio equipment to track 20,000 vehicles via unencrypted tire pressure sensors

C. da Costa Avatar
C. da Costa Avatar

By

Image: Pixnio

Key Takeaways

Key Takeaways

  • Mandatory tire sensors broadcast unencrypted signals enabling anyone to track vehicles covertly
  • Researchers captured 6 million tracking signals from 20,000 vehicles using $100 equipment
  • TPMS vulnerabilities remain unfixed since 2010 with no current cybersecurity regulations

Recent research from Spain’s IMDEA Networks Institute reveals that those mandatory Tire Pressure Monitoring System (TPMS sensors)—required in every vehicle since 2007—broadcast unencrypted radio signals containing unique identifiers. Anyone with basic radio equipment can capture these signals and track your movements with precision that would make a private investigator jealous.

The Shocking Scale of the Problem

Researchers captured 6 million tracking signals from over 20,000 vehicles in just 10 weeks.

The vulnerability isn’t theoretical. IMDEA researchers deployed $100 radio receivers near roads and parking areas, capturing tire sensor data from distances exceeding 164 feet—even through walls and obstacles. Unlike camera-based tracking, these signals penetrate barriers, making surveillance completely covert.

By matching all four tire IDs per vehicle, they could map precise arrival and departure patterns. “Our results show that these tire sensor signals can be used to follow vehicles and learn their movement patterns,” explains Professor Domenico Giustiniano, the study’s lead researcher.

Your Daily Routine, Exposed

From work commutes to weekend errands, everything becomes trackable data.

Think about your predictable routes: home to office, kids’ school pickup, grocery runs, that sketchy dive bar you pretend not to frequent. TPMS tracking reveals all of it. The sensors don’t just broadcast location—they include tire pressure readings that could reveal vehicle type, cargo load, or passenger count when combined with external databases.

This isn’t some futuristic dystopia; it’s happening now with technology designed purely for safety. As Dr. Yago Lizarribar from Switzerland’s Armasuisse notes, “TPMS was designed for safety, not security.”

No Easy Fix for Millions of Drivers

Current regulations ignore cybersecurity, leaving every post-2007 vehicle vulnerable.

Here’s the kicker: you can’t easily disable TPMS without triggering dashboard warnings or potentially failing vehicle inspections. No current regulations address TPMS cybersecurity, despite researchers highlighting these exact vulnerabilities in a 2010 Rutgers University study.

The automotive industry prioritized accident prevention over privacy protection—understandable then, inexcusable now. Until manufacturers implement encryption and authentication standards, every grocery store run potentially feeds someone’s surveillance database. Your car’s safety feature just became someone else’s tracking tool.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →