Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:Also, who does not separate drive control? (Score 2) 192

Normally there are two _separate_ CAN busses, one which handles all the critical crap, and one which handles the infotainment and comfort stuff. There's a module which connects the two, providing read-only queries from the second to the first. None of the hacks breached this system.

Oh really? Then how did that Jeep Cherokee hack via the infotainment system work?

from http://www.wired.com/2015/07/h... (emphasis mine)

As the two hackers remotely toyed with the air-conditioning, radio, and windshield wipers, I mentally congratulated myself on my courage under pressure. That's when they cut the transmission.

Immediately my accelerator stopped working. As I frantically pressed the pedal and watched the RPMs climb, the Jeep lost half its speed, then slowed to a crawl. This occurred just as I reached a long overpass, with no shoulder to offer an escape. The experiment had ceased to be fun.

Comment Re:More proof... (Score 1) 60

Is it any different then say apt-get using unsecured http or ftp connections?

In addition to the package .deb files being signed, the official package repositories have signed package indexes. I suppose one could just serve up a modified index without a signature, but apt might warn or error on that. (I haven't checked this part)

Slashdot Top Deals

I took a fish head to the movies and I didn't have to pay. -- Fish Heads, Saturday Night Live, 1977.

Working...