Settings

Theme

Hacking a Tesla Model S

blog.lookout.com

4 points by rizjoj 10 years ago · 1 comment

Reader

mschuster91 10 years ago

> We also found a number of vulnerabilities that allowed us to, with physical access to the vehicle, to gain root access to two of the infotainment systems

You should not have to depend on vulnerabilities to gain root access to a computer you own.

I'd rather like to see e.g. a system protected by a unique ECC SSH key, and you get the copy of the private key in paper together with your manual, as well as instructions on how to regenerate it.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection