• Petter1@lemm.ee
    link
    fedilink
    English
    arrow-up
    86
    ·
    10 months ago

    90 days till release of Zero-Days 😉 don’t update your tesla 😂 so you can gain root and really own that car

      • xthexder@l.sw0.com
        link
        fedilink
        English
        arrow-up
        18
        ·
        10 months ago

        There actually are a lot of really cool EV conversion builds on YouTube using fairly open parts. So I’d say this is perfectly accurate.

  • maness300@lemmy.world
    link
    fedilink
    English
    arrow-up
    33
    arrow-down
    1
    ·
    10 months ago

    Wow. Imagine paying $1.4mil to find 49 zero days instead of hiring an actual security team.

    The people who did this are fucking idiots.

    • Uriel238 [all pronouns]@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      41
      ·
      10 months ago

      White hats can be prosecuted via the CFAA. they usually aren’t (most of us are guilty of CFAA penalties) but some companies got sour to fixing their web security and instead would sue and push to prosecute.

      So in the early 2010s the white hat community went gray to survive. And companies that don’t pay their bounties oe cause trouble don’t get pen tested by white hats (at least not when wearing a white hat).

      • Patches@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        5
        ·
        10 months ago

        How do you know if a company is going to pay to fix?

        Do you just have to take a chance and notify them?

        Either I make a bunch of money, or they say fuck off, or they send me to jail? It seems too iffy

        • aksdb@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          10 months ago

          I assume the idea is, that the company then has a contract with the hacker, so they can no longer sue him. They essentially hack themselves via proxy.

        • Case@lemmynsfw.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          10 months ago

          Bounties are a bit nebulous.

          Actual pen testing companies have red teams (attackers) that have a scope of what they are allowed to target, and how they go about it.

          For example, just because a red teamer can get into the data center to do stuff locally doesn’t meet the scope requirement of testing their web page externally. They would be prosecuted most likely.

          Pen testing companies also have lawyers, at least they should, who help negotiate scope and what is legally allowed and in what context.

          Due to the secrecy needed for some tests, the security staff may not be aware a test is in place. From what I understand, generally people have some sort of paperwork on their person, or at least the contact information of someone at the company with the authority to authorize this red team pen test.

          That being said, cops may still get called, you may still get arrested, and have to deal with the courts.

          Or worse, some trigger happy security guard shoots you.

          I’m just studying that stuff though at the moment, so take what I said with a grain of salt.

    • WallEx@feddit.de
      link
      fedilink
      English
      arrow-up
      28
      ·
      edit-2
      10 months ago

      Thats what white hats would do and what these contests are usually for

      But its more like a bughunt with an open Bounty then selling afaik

  • DreadPotato@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    3
    ·
    edit-2
    10 months ago

    So, all these exploits seemingly still require physical access to the car/product electronics? If so, that seems to make it somewhat less of an issue (but still an issue of course) than if they could gain e.g. root access without physical access to the car or even proximity at all.

    • PrettyLights@lemmy.world
      link
      fedilink
      English
      arrow-up
      29
      arrow-down
      1
      ·
      10 months ago

      I’m not that worried about my laptop in regards to physical access because I don’t usually leave it in public unattended for long.

      My car? Sometimes that thing sits in a parking spot or paid garage for weeks when traveling. I also leave it unattended in public most times I go brick and mortar shopping.

      • DreadPotato@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        10 months ago

        Someone still needs to physically break in to the car, which will usually trigger alarms and attention. Like I said, it is still cause for concern, but moderate concern IMO. I would be a hell of a lot more worried if it was possible from anywhere in the world to take over my car remotely. The need for physical direct access to electronics inside the vehicle makes it less vulnerable.

        Are you worried about leaving your laptop in your house/apartment? Because anyone could also just break in there and have physical access to your stuff, arguably with even more privacy during the act than with a car parked out in public plain view.

        • webghost0101@sopuli.xyz
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          10 months ago

          Fair argument

          There is one additional factor though which is that the majority of crimes happen on impulses and depend on perceived potential for reward. A tesla, if you know where to sell it is a clear reward. Cars also tend to be very standard. If you can steal one you know how to steal plenty.

          For a house (tend to be more career criminals) you can never be sure there isn’t someone home, a dog. Layouts are unknown, chance of leaving identifiable evidence goes up as you take time. Escape routes may be limited. There is definitely some additional risk Involved, creative skill required.

          I am gonna go on a limb and say for criminals there as advantages and disadvantages to both types of thievery.

          Goes without saying that appropriating/breaking items, invading living space from others for any other reason then life/death survival isn morally repulsive and wrong.

        • PrettyLights@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          10 months ago

          Have you seen how fast car thieves can steal cars now? Through repeater attacks or special devices, they can be gone in 60 seconds.

          Car alarms only deter the most casual of thieves.

    • body_by_make@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      16
      ·
      10 months ago

      People said this about the Jeep vulnerabilities until they found a way to exploit them remotely.

      Where there’s smoke, there’s fire.

    • partial_accumen@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      10 months ago

      Hack a 1%s car

      A Tesla costs about the same as a Ford F-150 pickup. You want all those F150 drivers killed too?

      • nilloc@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        2
        ·
        10 months ago

        I’d love to hack into all F-150s and remap the maximum throttle opening to maybe 1/2. Also set speed limits to 70 maybe. Or add GPS based limits to keep the fuckers from basically drag racing down my narrow sidewalk less street.

        Actually doing Rams is probably best, and remapping diesels to prevent coal rolling would be high on the list too.