Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment OP doesn't understand the 4th Amendment (Score 1) 871

You can't be coerced into providing witness testimony. You don't have to speak to the cops even if you are just a witness UNLESS the state offers you immunity. If you are offered immunity, then you can be coerced. But I doubt that's what the OP was talking about. If it is, then his diatribe makes even less sense that it tries to make.

Comment Re:Holy Fuck People! (Score 5, Insightful) 688

Tesla doesn't want these buffoons selling Teslas because dealers don't really want to say them.

Sure, they'll pay lip service to the idea. But the problem is that Tesla's have very few moving parts. There's no money to be made off of Tesla services. And that's where these guys make their money. So they will use Tesla's to draw people in, but they'll sell something else.

By the way, who cares why? What if it is just because Elon hates TADA? In a free market, he should be able to sell direct if he wants.

Comment Re:To say these are flaws is an opinion (Score 1) 161

If I were to try this attack, I would up the car to a range charge and turn air conditioning on full blast. Then I would go through cycles of charging the battery up full and discharging it.

The electricity will add up, but maybe not a lot for most who can afford an $80K+ car.

The bigger issue is that this will decrease the battery life.

Comment Re:Seems Trollish (Score 1) 161

Re: #1
What has logging in over SSL got to do with anything?

If a third-party is storing credentials that control everything, then you are screwed if that third-party is compromised. Twitter suffered greatly from these kinds of problems prior to adopting OAuth. The trick with OAuth is that the third-party never sees the primary credentials, just an application-specific set of credentials with very specific access rights. Because of the design of OAuth, it's also easy to revoke credentials on an app-by-app basis and thus not impact the other apps interacting with the OAuth system.

Re: #2

Tesla is blameworthy because they opted for a less secure approach than is commonly accepted practice. If a third-party is compromised in an OAuth environment, only that one token with the application's specific access rights are at risk. You can revoke them and re-issue without impacting anything else using those credentials.

Finally, there's no need for any panic at all. TFA is not pushing panic. It's pushing the facts of an architectural flaw that does not arise to the level of being an active vulnerability. A flaw that exists for no good reason at all.

Comment Re:no exploits, though. (Score 1) 161

In a world of interconnected devices (the Internet of Things), it's not about hypothetical sites. It's about real, interconnected sites. There are real sites out there that talk to Teslas and provide value beyond what Tesla provides. If you are building a connected device in 2013, you should take this reality into account.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...