HenryT
Active Member
Very good that.Car theft is a game of car and mouse....
(Gets confusing when you ponder what cat theft is)
You can install our site as a web app on your iOS device by utilizing the Add to Home Screen feature in Safari. Please see this thread for more details on this.
Note: This feature may not be available in some browsers.
Very good that.Car theft is a game of car and mouse....
Enable Multi-Factor Authentication on your Tesla account.As we have multiple suggestions, what do people think are the top 4 or 5 things to do that achieves most things without being OTt? Mine are :
- avoid giving away tokens unless confident in who to
- P2D and sentry, but for me I’d like to have P2D excluded when at home, just like you can with sentry
- valet mode and a burner key fob when leaving yojr car with anyone
- never leave valuables on show
Yeah, sure. Wrap mirror with foil (that's where antenna is located) or remove SIM card. Suddenly it is a bit newer ford escort does the hardware manipulation suddenly makes it cyber?Given a Tesla is supposedly an internet connected smart device, it can stream cameras over the internet, stream music or accept voice commands even in a very basic argument of such. I guess it might fall under cyber security laws and Tesla have a responsibility to fix such vulnerabilities.
New cyber security laws to protect smart devices amid pandemic sales surge
Groundbreaking plans to protect people from cyber attackswww.gov.uk
Well yes, but that's the point.I watched the video you posted. You'll note he disconnected the MCU1 power, added signal interference to one of the data lines then re-started it such that it booted without P2D. The voiceover sounded a bit like 'safe mode' (i.e. MCU handles the garbage config in as reinitialise to new). He then manually disabled the default configured options. There was nothing on-screen to indicate it was in true service mode. Arguably Valet Mode is just another setting, which isn't enabled by default, so no luck there for MCU1. In my case I have MCU2, so it is an added layer of depth to attack resistance. Perhaps a window MCU2 sticker as deterrent might be good enough for both. The video description also mentions 'intentional inaccuracies' in its making.
Yeah, sure. Wrap mirror with foil (that's where antenna is located) or remove SIM card. Suddenly it is a bit newer ford escort does the hardware manipulation suddenly makes it cyber?
When someone robs cash machine with a digger and steals cash from cash machine. It it cyber crime (cash machine is a computer, connected to internet) or just simple robbery?
So, when someone uses a digger and pulls cash machine out of local shop wall - is this a robbery or cyber crime?I don't write the law. But the wording clear that cyber also means physical attacks as well.
So, when someone uses a digger and pulls cash machine out of local shop wall - is this a robbery or cyber crime?
Sorry, do you know how an ATM works?Not cyber because it's not a smart device, nor internet connected.
Sorry, do you know how an ATM works?
You believe it’s not connected to the internet?
ATMs aren’t connected to the Internet, they have private circuits providing connectivity to banking infrastructure with firewalls controlling traffic. That is vastly different to a consumer IOT device.Sorry, do you know how an ATM works?
You believe it’s not connected to the internet?
Internet or private circuit, I think we can all agree that attempting to hack an ATM is computer misuse.ATMs aren’t connected to the Internet, they have private circuits providing connectivity to banking infrastructure with firewalls controlling traffic. That is vastly different to a consumer IOT device.
Taking a cash machine from a wall using a digger is simple theft.So, when someone uses a digger and pulls cash machine out of local shop wall - is this a robbery or cyber crime?
but cash machine is connected to the internet and essentially is a computerTaking a cash machine from a wall using a digger is simple theft.
In the eyes of the law, it’s very simple.but cash machine is connected to the internet and essentially is a computer
you see, simple lines of cyber/non cyber does not apply so traightforward
Exactly.In the eyes of the law, it’s very simple.
As for whether something is considered a “cyber” attack, it comes down to the method of attack, generally being an attack carried out remotely via the internet or other communications network. Simply stealing something that is connected to the internet does not make it cyber crime.
@Roy B Dis you get any answer?They may currently be targeting MS (and one might imagine MX) but we know M3/MY attacks are coming down the line. Security researchers have demonstrated relay attacks against the M3 using phone key; assumed to be applicable to MY and to M3/MY fobs, too. Only a matter of time before the criminals get these tools.
Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks
Vendor: Tesla, Inc. Vendor URL: Versions affected: Attack tested with vehicle software v11.0 (2022.8.2 383989fadeea) and iOS app 4.6.1-891 (3784ebe63). Systems Affected: Attack tested on Model 3. M…research.nccgroup.com
I'm thinking a Disklok might be in order... Anyone know if the small size fits the M3 OK?
....committed by rats. Although to say that is to do a disservice to rodents.Car theft is a game of car and mouse.....
I believe he reffered to the digger as not internet connected...... even so the JCB is calling home unless the owner is also the perp'.Sorry, do you know how an ATM works?
You believe it’s not connected to the internet?