Deployment Scenarios · May 2026

Tesla replaced the fob. The relay attack still works.

The NFC card is passive but reachable. The Bluetooth phone key is continuous and demonstrably relay-attackable since 2022. Valet mode does not stop the unlock; PIN-to-Drive does not stop entry. The four-step Faraday protocol HNW EV principals use to close every vector — in one bag the principal already wishes they were carrying.

Published May 2, 2026 Reading time 5 min Attack vectors covered 3
REVIS-1 Executive Guard — Faraday-shielded carry for Tesla key card and phone key
The Short Answer

Tesla's key card (NFC, passive) and phone key (BLE, continuous) are both relay-attackable. The card needs a hostile reader within ~10 cm; the phone key has been demonstrated to fall to BLE relay attacks since 2022. Valet mode does not stop unlock. PIN-to-Drive prevents driving but not cabin access. The protocol that actually works: Faraday-isolate the key card and phone key whenever they're not in active driving use. Three shielded chambers in one carrier — wallet+keys for the card, tablet+phone for the phone key.

Operational Details

Three credentials. One carrier.

3 Chambers
Independent Shielding
NFC + BLE
Both Vectors Covered
76–85 dB
30 MHz – 10 GHz
2022
First Public BLE Relay
Built for the people who already know

HNW EV principals. Family offices with Tesla fleets. Concierge directors. Range-Rover-graduates who switched to electric.

The carrier built around the assumption that the key, the phone, and the laptop are all compromise vectors — not just the laptop. Boardroom-appropriate exterior. Premium leather. Made in the United States.

Critical Distinction

Three vectors. Tesla owners think they have one.

A valet stand at a five-star hotel. Your Model X is parked thirty feet away. Your phone is in your jacket pocket as you check in. Two BLE relay devices — one near you, one near the car. The Tesla authenticates to the relay device next to it as if your phone were standing right there. Doors unlock. Trunk opens. The laptop in the back, the registration with your home address, the garage opener — all of it accessible. PIN-to-Drive prevents the drive. It does not prevent the entry.
REVIS-1 Executive Guard — boardroom-grade Faraday carrier for executive principals
Vector 01 · NFC

The Tesla key card

Passive NFC — broadcasts only when energized by a reader. Relay range is ~10 cm. Easier to defend than the phone key, but in normal carry (pocket, wallet) the card is regularly within range of active NFC sources. Faraday-isolation in the wallet+keys chamber when not in active use closes the window entirely.

Vector 02 · BLE

The Tesla phone key

Bluetooth Low Energy continuous broadcast. BLE relay attacks against Tesla phone keys publicly demonstrated since 2022 — two paired relay devices, one near the principal's phone, one near the car. The Tesla authenticates as if the phone is at the vehicle. Defense: Faraday-shield the phone whenever not actively driving (overnight, in meetings, hotel room, conference floor).

Vector 03 · Fob

The optional Tesla key fob

Sold separately for Model S/X owners who prefer it to the card. Standard 315 / 433 MHz proximity broadcast — same relay-attack vector as Range Rover, BMW, Mercedes. Same Faraday solution: pouch in the wallet+keys chamber when not in active use.

Deployment Scenarios

The four-step protocol Tesla owners actually use.

02

Enable PIN-to-Drive in the Tesla app

Backstop layer. Even if the unlock is relay-attacked, the drive does not start without the PIN. Settings → Locks → Drive PIN. Use a unique PIN, not your phone-unlock PIN.

03

Disable passive entry when parked in untrusted environments

Settings → Locks → Passive Entry off. The car will only unlock with active key-card tap or phone-button press, eliminating the BLE-relay vector entirely. Re-enable for daily routines if the convenience matters; disable for hotel valet, conferences, and high-context business travel.

04

Don't leave anything in the cabin you wouldn't leave on the curb

Even with Faraday and PIN-to-Drive, assume the cabin will be entered eventually. Laptops, registration with home address, garage openers, key fobs to other vehicles — none of these belong in the parked Tesla overnight or in a high-traffic valet environment.

Acquire

Carry quietly. Move freely.

REVIS-1 Executive Guard. Three independent Faraday-shielded chambers. Wallet+keys+RFID for the Tesla key card. Tablet+phone for the phone key. Laptop for everything else. Boardroom-appropriate full-grain leather. The bag the HNW principal already wishes they were carrying.

🇺🇸 Made in USA Free U.S. Shipping 30-Day Return $129
Acquire — $129
REVIS-1 Executive Guard — three independent Faraday chambers for executive carry
FAQ

Common questions on Tesla key-card & phone-key Faraday.

Does the Tesla key card need a Faraday wallet?
Yes. The Tesla key card is a passive NFC device — it broadcasts when energized by a reader, not continuously. That means a casual relay attack against an idle card is harder than against a traditional key fob, but a hostile NFC reader within ~10 cm can still trigger the card. More importantly, in normal carry (pocket, wallet next to phone) the card is regularly close to active NFC sources. Faraday isolation when not in active use eliminates the attack window.
Is the Tesla phone key safer than the key card?
No — different attack surface, not a smaller one. The Tesla phone key uses Bluetooth Low Energy (BLE) to authenticate continuously when the phone is near the vehicle. BLE relay attacks against Tesla phone keys have been demonstrated publicly multiple times since 2022. The attacker uses two paired BLE relay devices: one near the principal's phone, one near the Tesla. The car authenticates to the relay device next to it as if the principal's phone were present. Faraday-shielding the phone when not in active driving use is the defense.
What about Tesla's PIN-to-Drive feature?
PIN-to-Drive is excellent for unauthorized-driving prevention but does not prevent unlock and entry — the relay attack still gets the thief into the car. Once inside, the attacker has access to whatever is in the cabin (laptops, documents, garage opener, registration with home address). PIN-to-Drive plus Faraday-shielded carry of the key card and phone key together solve the complete threat: relay attack cannot complete the unlock, and even if it could, the drive does not start.
Does the Tesla key fob (not card or phone) need Faraday too?
Yes — and it has the standard relay-attack vulnerability that all proximity-broadcasting fobs have. The Tesla key fob (sold separately for Model S/X owners who prefer it over the card) broadcasts on 315 MHz / 433 MHz like other modern fobs. Relay attacks work the same way they do against Range Rovers, BMWs, and Mercedes. Same Faraday solution, same protocol.
Is valet mode enough to skip the Faraday wallet?
No. Valet mode limits cabin access (glovebox locked), restricts speed and acceleration, and disables the homelink — all useful for valet attendants. It does not change the unlock/start authentication. The relay-attack vector is the same whether the car is in valet mode or not. Faraday isolation of the key card and phone key when not in active use is the only protection that addresses the unlock vector itself.
Which Faraday solution works for both the key card and the phone key?
The REVIS-1 Executive Guard. Three independent Faraday-shielded chambers in one chassis: laptop, tablet+phone, and wallet+keys+RFID. The wallet+keys chamber holds the Tesla key card alongside other RFID credentials. The tablet+phone chamber holds the phone key when not actively driving (overnight, in meetings, in the hotel room, at the conference). One bag, both attack surfaces, no separate accessories. Made in the United States. $129.
Block Every Signal

Carry everything.

The carrier built for the principal who switched to electric and assumed the key card was the answer. Hand-assembled in the United States. Reaches your door in 3–5 business days.

Acquire — $129
🇺🇸 Made in USA · Free U.S. Shipping · 30-Day Return

General information about Tesla key-card and phone-key relay-attack vectors as of May 2026. Vehicle security configurations change with software updates; verify current settings in the Tesla app for your model and software version.