Skip Navigation

Researchers jailbreak a Tesla to get free in-car feature upgrades

Researchers jailbreak a Tesla to get free in-car feature upgrades::A group of researchers found a way to hack a Tesla's hardware with the goal of getting free in-car upgrades, such as heated rear seats.

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)PI
piracy @lemmy.world

Tesla gets jailbreak. Finality!

1 0
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)TE
TechNews @radiation.party

Researchers jailbreak a Tesla to get free in-car feature upgrades

24 3
193 comments
  • It’s ridiculous how nowadays a lot of hardware car features are locked behind a simple software switch. Feels like both a massive waste of resources for people that don’t buy the upgrades, and like having to pay for a feature that is already physically present in your car. Software-only upgrades like full self driving are understandable, hardware upgrades locked behind a software gate aren’t.

    [cross-posted from my reply to the same article on c/news]

  • Muskovite builds vehicles with a built in micro-transaction PTW scheme? Hilarious.

  • A lower hanging fruit is usually present in systems like this. I wonder if they've tried glitching because thats what they were familiar with it, or if the software was not easily exploitable.

    • Typically low level attacks such as these is where it starts because they grant access to parts that can be used to learn more about the system as a whole.

      This understanding then can be used to find easier to exploit avenues.

      A good example of this is the history of exploits on Nintendo hardware.

      They almost all started with finding an exploit at the hardware level, which then subsequently lead to finding software exploits and ways to leverage them in an easy way for end users.

      • That's interesting. In a world where everything runs webkit, I thought it would work the other way around.

193 comments