Forum Discussion
itguy08
Jul 25, 2015Explorer
Let's look at your links...
on the DARPA link:
It's unclear how the hack happened. If someone has physical access to your vehicle, then game over. No different than any other "hack". Installing a black box on your OBD port enables you to control 100% of the car and that's on every car made with that system. Especially if you can install custom code on it. So nobody is talking about how this hack happened. But it did happen.
From the other:
Again nobody is talking and one wonders if these hacks all start out with something connected to the OBD port? The Bluetooth thing is scary but I'd want to know a lot more about how it happened. Was it a BT dongle like we use for scanning for codes or was it through the BT Cell connection. The latter is more scary than the former.
Probably best to look at your OBD port when you get in the car. :)
So the question is: if OnStar was hacked first, why did the researchers pick Uconnect? It would have made a much bigger splash to single out OnStar since they have by far the largest installed base!
Again, it's poor engineering on FCA's part. Par for the course with them.
on the DARPA link:
Although the intentionally-disguised vehicle was described by "60 Minutes" correspondent Lesley Stahl as a “regular new car,” it was actually a 2009 Impala running an older version of the OnStar software, according to GM spokeswoman Deana Alicia. The automaker isn’t sure, however, if the software was modified by DARPA in any way.
It’s also not clear if DARPA hacked the vehicle over a public cellular network, or through other means, but it was apparently able to install malignant code via the OnStar connection that gave researchers control over many of the car’s functions, according to the 60 Minutes report. DARPA has not yet responded to a request from Fox News for more details on the exact method used to access the car.
It's unclear how the hack happened. If someone has physical access to your vehicle, then game over. No different than any other "hack". Installing a black box on your OBD port enables you to control 100% of the car and that's on every car made with that system. Especially if you can install custom code on it. So nobody is talking about how this hack happened. But it did happen.
From the other:
In one case, a pair of hackers manipulated two cars by plugging a laptop into a port beneath the dashboard where mechanics connect their computers to search for problems. Scarier yet, another group took control of a car's computers through cellular telephone and Bluetooth connections, the compact disc player and even the tire pressure monitoring system.
Again nobody is talking and one wonders if these hacks all start out with something connected to the OBD port? The Bluetooth thing is scary but I'd want to know a lot more about how it happened. Was it a BT dongle like we use for scanning for codes or was it through the BT Cell connection. The latter is more scary than the former.
Probably best to look at your OBD port when you get in the car. :)
So the question is: if OnStar was hacked first, why did the researchers pick Uconnect? It would have made a much bigger splash to single out OnStar since they have by far the largest installed base!
Again, it's poor engineering on FCA's part. Par for the course with them.
About Travel Trailer Group
44,029 PostsLatest Activity: Jan 28, 2025