Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Also, who does not separate drive control? (Score 2) 192

Normally there are two _separate_ CAN busses, one which handles all the critical crap, and one which handles the infotainment and comfort stuff. There's a module which connects the two, providing read-only queries from the second to the first. None of the hacks breached this system.

Oh really? Then how did that Jeep Cherokee hack via the infotainment system work?

from http://www.wired.com/2015/07/h... (emphasis mine)

As the two hackers remotely toyed with the air-conditioning, radio, and windshield wipers, I mentally congratulated myself on my courage under pressure. That's when they cut the transmission.

Immediately my accelerator stopped working. As I frantically pressed the pedal and watched the RPMs climb, the Jeep lost half its speed, then slowed to a crawl. This occurred just as I reached a long overpass, with no shoulder to offer an escape. The experiment had ceased to be fun.

Comment Re:More proof... (Score 1) 60

Is it any different then say apt-get using unsecured http or ftp connections?

In addition to the package .deb files being signed, the official package repositories have signed package indexes. I suppose one could just serve up a modified index without a signature, but apt might warn or error on that. (I haven't checked this part)

Slashdot Top Deals

Suburbia is where the developer bulldozes out the trees, then names the streets after them. -- Bill Vaughn

Working...