For these other key fobs, there wasn't a master key that they could obtain. Instead they exploited the fobs' old and weak HiTag2 encryption algorithm. By capturing between four and eight encrypted ...