Before I even begin, none of this is more secure than non-paired parts because you can use a standard encryption on devices without physical pairing.
Now, you mention you are already aware of PCM, BCM, etc bypasses but you trust in the PATS. Here is how to work with those:
#4 is the Passive Anti-Theft System (PATS) transceiver electrical connector (part of 14401)
#5 is the PATS transceiver
Replacement is commonly done and the component that these are registered to is the Instrument Panel Cluster (IPC) which are commonly programed and hacked without permission from the manufacturer. Plus, most examples of PATS just disable the fuel injector, so you could bypass that in like 10min if you really wanted to. In fact, the only two parts paired in that example is the key to the PATS component because the PATS is not a paired part to the IPC, it’s easily replaceable.
You responded to yourself, you know?
Before I even begin, none of this is more secure than non-paired parts because you can use a standard encryption on devices without physical pairing.
Now, you mention you are already aware of PCM, BCM, etc bypasses but you trust in the PATS. Here is how to work with those:
#4 is the Passive Anti-Theft System (PATS) transceiver electrical connector (part of 14401)
#5 is the PATS transceiver
Replacement is commonly done and the component that these are registered to is the Instrument Panel Cluster (IPC) which are commonly programed and hacked without permission from the manufacturer. Plus, most examples of PATS just disable the fuel injector, so you could bypass that in like 10min if you really wanted to. In fact, the only two parts paired in that example is the key to the PATS component because the PATS is not a paired part to the IPC, it’s easily replaceable.