MsElectric
Active Member
Umm, the i8 needs the grill and exhaust..
Kidney grill: check
Fake exhaust when operating in retarded EV mode: check
Retarded ICE engine sounds piped through the sound system when operating in retarded EV mode: check
You can install our site as a web app on your iOS device by utilizing the Add to Home Screen feature in Safari. Please see this thread for more details on this.
Note: This feature may not be available in some browsers.
Umm, the i8 needs the grill and exhaust..
Also, please stop going on about IP law. That has nothing to do with this.
Methinks you don't know the difference between obsolete and obsolescence enough to at least use the latter.
Literally anything no longer produced can be called obsolete
adjective: obsolete
1.
no longer produced or used; out of date.
but figuratively obsolete is reserved for things that are no longer useful. And since a car is usually drivable for 10+ years I don't consider a car from a few months ago obsolete if they stop making it today.
My understanding of the law is that generally an employer is only vicariously liable for the acts of their employees, negligent or otherwise, is if the act done was within the scope and authority of their employment. It may be that this was a rogue employee who acted on his own accord and outside of his authority. As such Tesla, may not be liable. That's just my personal opinion though regarding the application of the law.
Hash - encrypting something is alsocalled hashing itOk, I have stayed by the river with the luggage while the rest of you ventured forth.
I think I understand the drift of what happened between WK and Tesla. But I am struggling with a couple of things[emoji2]
wk said he should have "salted the hash." I get salted--it is part of an old con with trying to sell a mine--you salt the mine with whatever it is you claim to have found in order to swindle someone. But the term hash (noun) is foreign to me, since we are not talking about a food dish, an extract of C. sativa, or agricultural byproducts that have limited value. Clearly to me these strings of numbers and letters had some sort of meaning. But they just looked like a bunch of gibberish to me. As a stupid person, it would seem to me that if these strings of letters and numbers were important or sensitive, they could have been altered.
Then, Bonnie mentioned something about these EAP participants. What are EAP participants?
Thanks in advance!
I will say this one more time in the (probably vain) hope that certain people take notice this time:
wk057 did not deliberately leak information
That dubious distinction belongs to whoever first broke the cryptographic hash and published the result, not wk.
The only thing wk did wrong was making the obfuscation too easy to overcome. It was an honest mistake, not malice or recklessness.
If you do not acknowledge the above, you're not even on topic here.
I will say this one more time in the (probably vain) hope that certain people take notice this time:
wk057 did not deliberately leak information
That dubious distinction belongs to whoever first broke the cryptographic hash and published the result, not wk.
The only thing wk did wrong was making the obfuscation too easy to overcome. It was an honest mistake, not malice or recklessness.
If you do not acknowledge the above, you're not even on topic here.
Ok, I have stayed by the river with the luggage while the rest of you ventured forth.
I think I understand the drift of what happened between WK and Tesla. But I am struggling with a couple of things :smile:
wk said he should have "salted the hash." I get salted--it is part of an old con with trying to sell a mine--you salt the mine with whatever it is you claim to have found in order to swindle someone. But the term hash (noun) is foreign to me, since we are not talking about a food dish, an extract of C. sativa, or agricultural byproducts that have limited value. Clearly to me these strings of numbers and letters had some sort of meaning. But they just looked like a bunch of gibberish to me. As a stupid person, it would seem to me that if these strings of letters and numbers were important or sensitive, they could have been altered.
Then, Bonnie mentioned something about these EAP participants. What are EAP participants?
Thanks in advance!
Hash - encrypting something is alsocalled hashing it
Salt the hash - use a seed value for the encryption algorithm that makes it harder to reverse unless you know the seed (salt)
Thanks! I never saw this event streamed. The article's phrasing is very sloppy IMO so I'd love to see some actual quotes. As an example, their phrasing could be true even for a Tesla-made bicycle. Anybody have a transcript?via "The Google", during an interview with Danish press during European factory opening
600-Mile Range Tesla | Specs, News, Rumors | Digital Trends
Again, you miss the point. Had wk actually done this properly - i.e. use random salt - it would've been literally impossible to break without the salt. There could be no leak.Wow. If I post a puzzle and challenge people to solve it ... and they do ... well it's clear you and I reach different conclusions on that scenario.
Ooh! Thanks.Elon Musk Hints At 50 Percent More Range For Tesla Model S: Video
Note that he could mean under optimum conditions, but the point still applies.
Probably not a great defense, since wk is hardly the only one. There are a lot of people on this forum who keep a lot of information confidential. Only an fyi.
For instance, I'm guessing a large number of EAP participants are here on the forum daily. Yet we don't know who they are. They see the new features weeks, sometimes months, before the rest of us & we don't know about those (unless they leak & then they're no longer in the EAP). They do a lot of work for the rest of us and don't talk about it publicly. A lot of bugs are found because of these folks and your car is safer and more reliable because of them.
Tesla rewards the bug finders publicly. EAP participants contribute quietly in the background, without asking for recognition. Maybe we could show a little appreciation for those folks?
To be clear, it's not about wk vs. the EAP participants. I'm only attempting to point out that he's hardly the only one with confidential information at any given time, since you seem to think wk isn't getting his proper recognition. There are a lot of folks you're ignoring who get zero recognition and are fine with that.
(And EAP participants are only one group who hold confidential information. There are posters here who have vendor relationships and honor the NDAs that they signed. There are other posters here with close family members inside Tesla & you'd never know it because they post zero hints towards what is coming. Just examples. Many more. )
Again, you miss the point. Had wk actually done this properly - i.e. use random salt - it would've been literally impossible to break without the salt. There could be no leak.
Don't believe me? Well, he's posted another hash - this time done right - and nobody has broken it. Nobody will, because cryptography done right is, to all intents and purposes, an unbreakable box.
He assumed (wrongly) first time that what he was posting would have that level of security. Really, can't you give the guy some slack for not being at 100% smarts at that moment?
Personally, I appreciate all the work of people like wk to help contribute to the safety and security of the platform with no official recognition.
What you're doing is ignoring both circumstance and motivation.Who put the information out on the internet? What you're doing is called rationalization.
Really? Go break the second hash and tell me how "tough" it was.And no, cryptography done right is not 'unbreakable'. It is tough to break.
You know what's unbreakable? Not sharing the information in any manner.
Do you always take pleasure when bad things happen to people?
Depends on the situation. Would you not laugh if you saw a massive amount of snow dump on occupants because someone forgot to clear their roof before opening?