NuclearPowered
Member
Would you mind taking photos of all the diagnostic menus? I don't think that exists in the wild
You can install our site as a web app on your iOS device by utilizing the Add to Home Screen feature in Safari. Please see this thread for more details on this.
Note: This feature may not be available in some browsers.
Worth noting this is a dismantle-the-car exploit...... so not super useful for non-bench stuff. I'm not taking my car apart to do this on my own vehicles... lol. But I can play CAN data to my bench and let it decode it for me.
Game over.
*pictures Jason locking himself in the test bench room and not emerging for ... at least a few days ...*
Scott, let me preface this by saying I like and respect you.
While I applaud your work and would love to have this level of access in my own car, you really should report the vulnerability you used to Tesla to ensure it does get patched. I'm sure it's likely something they should already know about but still would be the right thing to report it.
Scott^H^H^H^H^H Jason, let me preface this by saying I like and respect you. You have contributed a lot to TMC, solar, etc., and you put your knowledge and money where your mouth is (going off grid, etc.)
Having said that, while I am just as much a geek as many of us here and am curious to learn more about our cars, I think you may be stepping over the line a bit. I recognize that you haven't shared how to exploit Tesla's OS, and I'm glad that you haven't. I encourage you to consider reporting it under the bug bounty program. Posting details of the intervals of Tesla's proprietary OS could have ramifications for Tesla, us, and you. Do you really want to get into a fight with Tesla?
I know you will likely have a different view (obviously), and many others here will as well, but I felt compelled to say something and share my opinion. So I've done that, and I'm about to take off on vacation and may not be able to read the replies for a week. Unless of course I give in and check in during vacation
(I guess this was a bit like lighting a fuse and running away. Sorry about that...)
Andrew
I'll save you the trouble. It has been patched.
That was the way that the guys at DEFCON did it. (they even got a recognition from the developers on that one) Not really too much you can do other than API stuff when you get to that point. The gateway does not allow for arbitrary CAN command pass-through. IF it did, they would be looking alot more like Jeep/Chrysler Group did... egg all over face.
I very well may whip up some adapters to do this with the right connectors and all if I can find a good source for these oddball connectors.
And by Scott you mean Jason.
Posting pictures of the internal systems... Eh, i dunno. I have very mixed feelings about it.