Of a huge set of devices of this type, only a very small amount can withstand hijackers. A weak place here is coding algorithms that, being radio frequency, are available to everyone. When theft, “Code-grabers” are used, which are special devices that “produce” electronic master.