SkyJack works by monitoring the media access control (MAC) addresses of all Wi-Fi devices within radio range. When it finds a MAC address belonging to a block of addresses used by Parrot AR.Drone vehicles, SkyJack uses the open-source Aircrack-ng app for Wi-Fi hacking to issue a command that disconnects the vehicle from the iOS or Android device currently being used to control and monitor it. Operators of the flying hacker drone are then able to use their own smart device to control the altitude, speed, and direction of the hijacked drone and to view its live video feeds.
This new system would not have gotten much publicity had it not been the perfect timing to come out at the same time that Amazon starts speaking of sending deliveries in 30min via flying drones.
Nevertheless it is a clear demonstration that we live in a "digital far west era": no rules, open country, first to come and set its flag into an area becomes owner, and the right to bear arm, to defend yourself, because there is no implicit or explicit community protection. It is every man for itself. That is the digital era we live in and it let's the best and the worst come out.
This "drone hack" is a kind reminder that, as developers, engineers, software developers or any digital field expert, you must assume that your device or application will be
I am sure that this was far from the minds of the Parrot developers, back in 2007-8-9-10 when they were designing their drones in labs. Never would they have imagined that their design would be distributed in 500K+ volume and thus become target of those hacks. Well, they should have.
Same applies to designers of the tire pressure sensors in cars. Should they have conceived their system to prevent hacking, as they were designed in an era where the Internet was in full use (circa 2005)? The answer is maybe.
But today, the answer must be YES for all and any new device or solution.