On February 8, François-Philippe Champagne, the Canadian Minister of
  Innovation, Science and Industry, [1]announced Canada would ban devices
  used in keyless car theft. The only device mentioned by name was the
  Flipper Zero—the multitool device that can be used to test, explore,
  and debug different wireless protocols such as RFID, NFC, infrared, and
  Bluetooth.

  EFF explores toilet hacking

  While it is useful as a penetration testing device, Flipper Zero is
  [2]impractical in comparison to other, more specialized devices for car
  theft. It’s possible social media hype around the Flipper Zero has led
  people to believe that this device offers easier hacking opportunities
  for car thieves*. But government officials are also consuming such
  hype. That leads to policies that don’t secure systems, but rather
  impedes important research that exposes potential vulnerabilities the
  industry should fix. Even with Canada [3]walking back on the original
  statement outright banning the devices, restricting devices and sales
  to “move forward with measures to restrict the use of such devices to
  legitimate actors only” is troublesome for security researchers.

  This is not the first government seeking to limit access to Flipper
  Zero, and we have [4]explained before why this approach is not only
  harmful to security researchers but also leaves the general population
  more vulnerable to attacks. Security researchers may not have the
  specialized tools car thieves use at their disposal, so more general
  tools come in handy for catching and protecting against
  vulnerabilities. Broad purpose devices such as the Flipper have a wide
  range of uses: penetration testing to facilitate hardening of a home
  network or organizational infrastructure, hardware research, security
  research, protocol development, use by radio hobbyists, and many more.
  Restricting access to these devices will hamper development of strong,
  secure technologies.

  When Brazil’s national telecoms regulator [5]Anatel refused to certify
  the Flipper Zero and as a result prevented the national postal service
  from delivering the devices, they were responding to media hype. With a
  display and controls reminiscent of portable video game consoles, the
  compact form-factor and range of hardware (including an infrared
  transceiver, RFID reader/emulator, SDR and Bluetooth LE module) made
  the device an easy target to demonize. While conjuring imagery of
  point-and-click car theft was easy, citing examples of this actually
  occurring proved impossible. Over a year later, you’d be hard-pressed
  to find a single instance of a car being stolen with the device. The
  number of cars stolen with the Flipper seems to amount to, well, zero
  (pun intended). It is the same media hype and pure speculation that has
  led Canadian regulators to err in their judgment to ban these devices.

  Still worse, law enforcement in other countries have signaled their own
  intentions to place owners of the device under greater scrutiny. The
  Brisbane Times [6]quotes police in Queensland, Australia: “We’re aware
  it can be used for criminal means, so if you’re caught with this device
  we’ll be asking some serious questions about why you have this device
  and what you are using it for.” We assume other tools with similar
  capabilities, as well as Swiss Army Knives and Sharpie markers, all of
  which “can be used for criminal means,” will not face this same level
  of scrutiny. Just owning this device, whether as a hobbyist or
  professional—or even just as a curious customer—should not make one the
  subject of overzealous police suspicions.

  It wasn’t too long ago that proficiency with the command line was seen
  as a dangerous skill that warranted intervention by authorities. And
  just as with those fears of decades past, the small grain of truth
  embedded in the hype and fears gives it an outsized power. Can the
  command line be used to do bad things? Of course. Can the Flipper Zero
  assist criminal activity? Yes. Can it be used to steal cars? Not nearly
  as well as many other (and better, from the criminals’ perspective)
  tools. Does that mean it should be banned, and that those with this
  device should be placed under criminal suspicion? Absolutely not.

  We hope Canada wises up to this logic, and comes to view the device as
  just one of many in the toolbox that can be used for good or evil, but
  mostly for good.

  *Though concerns have been raised about Flipper Devices' connection to
  the [7]Russian state apparatus, no unexpected data has been observed
  escaping to Flipper Devices' servers, and much of the dedicated
  security and pen-testing hardware which hasn't been banned also suffers
  from similar problems.

References

  1. https://www.canada.ca/en/public-safety-canada/news/2024/02/government-of-canada-hosts-national-summit-on-combatting-auto-theft.html?ref=blog.flipper.net
  2. https://blog.flipper.net/response-to-canadian-government/
  3. https://www.pcmag.com/news/canada-walks-back-ban-of-flipper-zero-targets-illegitimate-use-cases
  4. https://www.eff.org/deeplinks/2023/03/flipper-zero-devices-being-seized-brazils-telecom-agency
  5. https://www.gov.br/anatel/pt-br
  6. https://www.brisbanetimes.com.au/national/queensland/police-email-warns-new-device-can-emulate-car-fobs-garage-door-remotes-20240325-p5ff1e.html
  7. https://simovits.com/wp-content/uploads/2023/09/Flipper-Zero-Zero-Trust-or-Beware-of-Geek-Bearing-Gifts-2023.pdf