![]() ![]() In general, cars have become rolling computers that slurp up personal data from users' mobile devices to enable "infotainment" features or services. The contrast raises questions about whether Tesla has clearly defined goals for data security, and who its existing rules are meant to protect. ![]() Owners must purchase $995 cables and download a software kit from Tesla to get limited information out of their cars via "event data recorders" there, should they need this for legal, insurance or other reasons.Īt the same time, crashed Teslas that are sent to salvage can yield unencrypted and personally revealing data to anyone who takes possession of the car's computer and knows how to extract it. ![]() On one hand, Tesla holds car-generated data closely, and has fought customers in court to refrain from giving up vehicle data. The practice is widespread enough that the US Federal Trade Commission has issued advisories to drivers warning them about pairing devices to rental cars, and urging them to learn how to wipe their cars' systems clean before returning a rental or selling a car they owned.īut the researchers' findings highlight how Tesla is full of contradictions on privacy and cybersecurity. Many other cars download and store data from users, particularly information from paired cellphones, such as contact information. He agreed to speak and share data and video with CNBC on the condition of pseudonymity, citing privacy concerns. He has extracted this kind of data from the computers in a salvaged Tesla Model S, Model X and two Model 3 vehicles, while also making tens of thousands of dollars cashing in on Tesla bug bounties in recent years. One researcher, who calls himself GreenTheOnly, describes himself as a "white hat hacker" and a Tesla enthusiast who drives a Model X. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |