![]() We commend the research team behind this demonstration and look forward to continued collaboration with them and others to facilitate this kind of research. ![]() In order for anyone to have ever been affected by this, they would have had to use their car’s web browser and be served malicious content through a set of very unlikely circumstances. ![]() This demonstration wasn’t easy to do, and the researchers overcame significant challenges due to the recent improvements we implemented in our systems. While the risk to our customers from this type of exploit is very low and we have not seen a single customer ever affected by it, we actively encourage research of this kind so that we can prevent potential issues from occurring. UPDATE: A Tesla spokesperson reached out to provide this statement regarding the hack and related research: By working closely with this research group following their initial findings last year, we responded immediately upon receiving this report by deploying an over- the- air software update (v. What we’re seeing here will likely be the new normal in the future a never- ending arms race between hackers and companies, with security protocols made and broken, over and over, until we evolve into beings of pure orgone energy or the heat death of the universe, whichever comes first. The team managed to get control over both the Model X’s CAN bus (the overall internal network connecting the car’s electronic systems) and the ECU, for lower- level control. It’s notable that the lights that blink on and off are controlled independently this isn’t just sending signals to blink an indicator or turn on the low- beams each individual lighting sub- unit is controlled independently. Other things, like the bonkers light show set to music, are new, and show the degree of control they’ve managed to get over the car. Sure, it was harder, but the research team broke through, and produced this video showing what they accomplished: Some of what they managed was similar to what had been accomplished last year, just on the Model X and defeating the code signing security. Tesla introduced a system of firmware code signing in an attempt to prevent future similar hacks as Tencent Keen Labs just proved, those efforts just weren’t good enough. ![]() What’s especially notable is that after their demonstration of the Model S hacks in 2. After discovering similar vulnerabilities in the Model S last year, the Chinese security research firm Tencent Keen Security Lab have turned their attention to the Tesla Model X, and have been able to exploit these security holes to remotely do things to the Model X like open its doors, blink the lights, control in- car displays, and, most worryingly, actuate the brakes while the car is in motion. Chinese Researchers Hack The Tesla Model X So Hard They Make It Do A Lightshow. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
June 2023
Categories |