laitimes

Hackers remotely cracked 25 Teslas, intelligence and security can not coexist?

Is it really worth it to exchange privacy for convenience?

Hackers remotely cracked 25 Teslas, intelligence and security can not coexist?

Recently, there were media reports that a 19-year-old German teenager actually found a security loophole in Tesla's system, and through this vulnerability, it invaded 25 Tesla cars in 13 countries, allowing the car to close these loopholes in the security system, not only can open the window door to control the steering wheel, but also can achieve keyless driving. And the specific location of these models is also exposed, and it is also possible to see if the owner is near the vehicle. So this matter has become a very hot topic, so under the irreversible development trend of intelligent vehicles, will intelligence and safety become a contradiction that can never be solved?

Hackers remotely cracked 25 Teslas, intelligence and security can not coexist?

Is intelligence and security always an insoluble contradiction?

Intelligence is an irreversible development trend, in fact, not only the car has become smarter, our mobile phone is more intelligent, it can be said that since having a smart phone, our positioning, some of our bank account information, some of our personal life privacy are on the smart phone. The existence of smart phones, on the one hand, does facilitate our lives, but it also makes it easier for us to leak our personal privacy and security.

Hackers remotely cracked 25 Teslas, intelligence and security can not coexist?

So when we get some benefits, we also have to give up some benefits. So the same is true for smart cars, an intelligent car that currently contains more than 150 electronic control components and about 100 million lines of software code, which also provides a good opportunity for hackers to attack. So since this incident appeared, Tesla's security department has contacted the teenager for the first time.

Hackers remotely cracked 25 Teslas, intelligence and security can not coexist?

As users, how can we protect our legitimate rights and interests from infringement?

Whether it's the leakage of personal privacy in your smartphone, or the hacking of your car. This is a serious violation of your personal interests, in fact, it has broken the law. So as users, how do we protect our personal privacy? In fact, this is also a very headache problem, because sometimes our privacy leakage is inadvertent.

For example, if we go to a 4S store to buy a car and leave a phone for the sales, then every once in a while, all other brands of 4S stores seem to know that you are going to buy a car and call you. If you want to buy a house and leave a phone number for the dealer, then after a while all the decoration companies will call you and ask you if you want to renovate. So it's all information that we inadvertently leaked. For such a personal message leak, we really have no way, and we can only block these harassing calls through some mobile phone software.

Hackers remotely cracked 25 Teslas, intelligence and security can not coexist?

Then cars, we can do even less. Do we have to put a lock on the steering wheel every time we get out of the car? In the past, when cars were not very safe, many people bought such locks to prevent them from being stolen. But now there are very few steering wheel locks. So in fact, for users, there are very few things that can be done to protect their privacy.

Hackers remotely cracked 25 Teslas, intelligence and security can not coexist?

The contradiction of intelligence and security, we can only hope for the country?

Since individuals can't do a lot of things, we can only hope that the state can hope that mobile phone companies, including automobile companies, can strengthen supervision and strengthen technological upgrading. Simply put, the road is one foot high, and the devil is one foot high. At the national level, it can be further improved through laws and regulations, including strengthening penalties, and once it is found that hackers maliciously attack other people's smart cars, then it is in a high penalty. Through such a method, in fact, some unscrupulous hackers can be deterred. Even if they have technology, even if they find loopholes, they don't dare to act rashly.

The second is that car manufacturers should constantly improve the system upgrade of the vehicle, find loopholes in time, and maintain in time. Don't give hackers an opportunity. There is also a timely report to the relevant state departments once it is found to be attacked by the network.

The epidemic is still raging, epidemic prevention can not be sloppy, everyone should wash their hands frequently, wear masks, ventilate frequently, do not get together, maintain a safe distance of one meter, protect themselves, and do not add trouble to the country. Xi'an, Tianjin, Xuchang, Shenzhen Come on! Come on! Come on!

Read on