this post was submitted on 04 Aug 2023
569 points (99.1% liked)

Technology

59377 readers
3769 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

The researchers will present their research next week at the Black Hat cybersecurity conference in Las Vegas.

Christian Werling, one of the three students at Technische Universität Berlin who conducted the research along with another independent researcher, said that their attack requires physical access to the car, but that’s exactly the scenario where their jailbreak would be useful.

“We are not the evil outsider, but we’re actually the insider, we own the car,” Werling told TechCrunch in an interview ahead of the conference. “And we don’t want to pay these $300 for the rear heated seats.”

The technique they used to jailbreak the Tesla is called voltage glitching. Werling explained that what they did was “fiddle around” with the supply voltage of the AMD processor that runs the infotainment system.

“If we do it at the right moment, we can trick the CPU into doing something else. It has a hiccup, skips an instruction and accepts our manipulated code. That’s basically what we do in a nutshell,” he said.

With the same technique, the researchers said they were also able to extract the encryption key used to authenticate the car to Tesla’s network. In theory, this would open the door for a series of other attacks, but the researchers said they still have to explore the possibilities in this scenario.

The researchers said they were also able to extract personal information from the car such as contacts, recent calendar appointments, call logs, locations the car visited, Wi-Fi passwords and session tokens from email accounts, among others. This is data that could be attractive to people who don’t own that particular car, but still have physical access to it.

Mitigating the hardware-based attack that the researchers achieved is not simple. In fact, the researchers said, Tesla would have to replace the hardware in question.

Tesla did not respond to a request for comment.

you are viewing a single comment's thread
view the rest of the comments
[–] gapbetweenus@feddit.de 8 points 1 year ago (1 children)

I use a macbook, what functions are looked behind a paywall? Curious what am I missing.

[–] Thorny_Thicket@sopuli.xyz 9 points 1 year ago (1 children)

I'm not sure about macs but on iPhones several components are coded to that specific device so it limits functions if you take it get repaired anywhere else but at Apple.

[–] gapbetweenus@feddit.de 3 points 1 year ago (1 children)

Ah, forgot about it - don't have an iPhone. But that is also really shitty, but a bit different. Apple has for sure some shitty practices - there is no arguing around it.

[–] Thorny_Thicket@sopuli.xyz 4 points 1 year ago (1 children)

The main point is that since it's your device you should be allowed to do what ever you like with it including repair it yourself. In that case it feels a bit like you're renting it because every time something goes wrong you need to take it back to Apple.

[–] gapbetweenus@feddit.de 1 points 1 year ago

No arguing from my side. Now that you say it - I need to replace a battery on an older macbook and don't do it, because it's expensive and I'm too lazy to do it my self, since it's unnecessary complicated.