Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Re:Also, who does not separate drive control? (Score 2) 192

Normally there are two _separate_ CAN busses, one which handles all the critical crap, and one which handles the infotainment and comfort stuff. There's a module which connects the two, providing read-only queries from the second to the first. None of the hacks breached this system.

Oh really? Then how did that Jeep Cherokee hack via the infotainment system work?

from http://www.wired.com/2015/07/h... (emphasis mine)

As the two hackers remotely toyed with the air-conditioning, radio, and windshield wipers, I mentally congratulated myself on my courage under pressure. That's when they cut the transmission.

Immediately my accelerator stopped working. As I frantically pressed the pedal and watched the RPMs climb, the Jeep lost half its speed, then slowed to a crawl. This occurred just as I reached a long overpass, with no shoulder to offer an escape. The experiment had ceased to be fun.

Comment Re:More proof... (Score 1) 60

Is it any different then say apt-get using unsecured http or ftp connections?

In addition to the package .deb files being signed, the official package repositories have signed package indexes. I suppose one could just serve up a modified index without a signature, but apt might warn or error on that. (I haven't checked this part)

Slashdot Top Deals

We will have solar energy as soon as the utility companies solve one technical problem -- how to run a sunbeam through a meter.

Working...