WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

1.2K

It's shit like this that makes me not want to have anything "smart" or connected in my car in the first place. At least I drive something so old it doesn't have any that I didn't install myself.

Archive: https://archive.today/OSm7u

From the post:

>When security researchers in the past found ways to hijack vehicles' internet-connected systems, their proof-of-concept demonstrations tended to show, thankfully, that hacking cars is hard. Exploits like the ones that hackers used to remotely take over a Chevrolet Impala in 2010 or a Jeep in 2015 took years of work to develop and required ingenious tricks: reverse engineering the obscure code in the cars’ telematics units, delivering malicious software to those systems via audio tones played over radio connections, or even putting a disc with a malware-laced music file into the car’s CD drive.

It's shit like this that makes me not want to have anything "smart" or connected in my car in the first place. At least I drive something so old it doesn't have any that I didn't install myself. Archive: https://archive.today/OSm7u From the post: >>When security researchers in the past found ways to hijack vehicles' internet-connected systems, their proof-of-concept demonstrations tended to show, thankfully, that hacking cars is hard. Exploits like the ones that hackers used to remotely take over a Chevrolet Impala in 2010 or a Jeep in 2015 took years of work to develop and required ingenious tricks: reverse engineering the obscure code in the cars’ telematics units, delivering malicious software to those systems via audio tones played over radio connections, or even putting a disc with a malware-laced music file into the car’s CD drive.
[–] 1 pt

Can't wait until fingerprint hash codes, face hash codes and implanted Id hash codes are hacked. Fun times.

[–] 1 pt

We already have collisions that can be generated for many modern "checksums". With enough time it is possible make a random image that will match a checksum to about anything you want. Too many systems are still using checksums that are decades old just out of simplicity and speed.