Tue Sep 22, 2020 6:18 pm by MHM
That Wired article is dated 8/8/2008 so it's old news now; that was pretty much the height of the "beating up on Medeco especially the M3" era.
This whole spoofing keys thing has moved on a bit from this stuff, there's much more emphasis these days on the ability to photograph a key from a distance (say, take a photo of somebody's keychain from across a carpark) and then 3D print the key in metal after having electronically messed about with the photographic image to account for the fact that you probably weren't able to get a shot of the key exactly flat.
From a purely philosophical perspective you can draw a historical line on this attack all the way from taking a wax impression of a key, through the method discussed in the article above, to the more recent photographic techniques - it's all about encoding the cryptographic data encoded on the legitimate key onto another tool, via some kind of intermediary medium and process. Fascinating stuff.