Welcome to Tesla Motors Club
Discuss Tesla's Model S, Model 3, Model X, Model Y, Cybertruck, Roadster and More.
Register

Whoa! Come on tesla!

This site may earn commission on affiliate links.
Going off-topic, but the 1Password "standalone" license is still very much available. It's what I use vs. the subscription model. In the app, when you launch, on the welcome screen, underneath the "Subscribe now" button - there's one for "Need a licence. We have those too". That'll get you a standalone license.
Thanks. I do miss the bundles they used to have.
 
I'm not sure that's true. It seems to me like the result of the successful man in the middle here is that the hacker's computer has now been authenticated as a valid user by 2FA and issued a token, and he should then be able to do anything the app can do until the token expires...
That's true if it is authenticating the device for future use. I was thinking that it would use 2FA for all logins even if they were on the same device as a previous login.
 
That's true if it is authenticating the device for future use. I was thinking that it would use 2FA for all logins even if they were on the same device as a previous login.
People would be annoyed if 2FA was required all the time. Google/apple, etc allow 30 days. The man in the middle can always do that and get a 30day auth.


Heck, people are trying (some successful) by calling cell numbers and asking for the code that appears on the screen. Then they login to the phone company page and order a new sim or transfer the service.

Once the crook has the phone, all other accounts that use out of band 2FA (calls or text) are easily compromised.
 

Sharing this video because I’d hate to have mine stolen. I was surprised to learn tesla doesn’t let you use 2 factor authentication at the minimum when I got mine. Heck Gmail, my bank, all use this. Anyway watch the vid. I know my password is randomly generated and but I’ll need to change this every month at least. My guess is to ease service maybe? Like how apple makes you remove your login when doing warranty work.
Hmmm I thought in order for your phone to work as a key it had to be paired with one of the original key cards????
 
Never enter your login to an insecure (no HTTPS) site, and make sure the site is what it says it is / what you think it should be.

You can make a fake tesla.com webpage with perfect fidelity, but you can't fake the HTTPS certificates as easily. You'll have to compromise a root certificate and use it to issue your own certificate, or you would have to steal Tesla's private key.

If you just pay attention to the site name and ensure it's https then you should avoid these man in the middle attacks.
 
  • Like
Reactions: Sherlo and Joshan
Not the unlock, start buttons, trunk, temp, etc within the app.

The model 3 paired Bluetooth thingy - that works by proximity requires pairing.
Oh wow, I assumed actual access to the car would require the initial pairing with one of the car cards. If the only real security are owners being savvy with password management, there are going to be a lot of easy targets.
 
  • Love
Reactions: Rottenapplr
Multifactor authentication is your friend; it should be deployed across all login elements, including web site, App and vehicle console. Passwords are a risk regardless of complexity and should be avoided when used alone. Bluetooth and RF relay attacks are real; which is also why it is a good idea to enable PIN to Drive.

Statistically, Teslas are a rather poor choice to steal, at least here in the States - and this is reflected in the stats that I've seen - a low theft rate, and a high recovery rate. I believe this is the article I read last year: https://electrek.co/2018/08/10/tesla-stolen-vehicles-us-recovered-thieves/

There is a careful balance between convenience and security; take it too far, and you may lower the driving experience. By way of example, until Apple added TouchID, most users (90%) didn't even pin-enable their phones. Without a pin, many of the cryptographic functions on the phone did not come into play further reducing the user's data security. TouchID (and now FaceID) was a brilliant addition because it added multifactor authentication, and is very easy to use - nearly all users leverage this technology today once it was made available to users.

Adding a biometric or face recognition to the inside passenger facing camera would be a cool feature to have. The car could theoretically recognize who is sitting in the seats, and adjust accordingly, whereby a foreign or unrecognized face could trigger an alert or lock-down.

I sense that Tesla won't be inclined to add this based on theft statistics alone, but may do so if it adds convenience or cool factor that sets them even further ahead of their competitors.
 
All else aside, I have PIN to Drive enabled in my car. Case closed. It is completely unrelated to any of my personal information. Some hacker has a 1 in 10,000 chance of guessing it. And it isn't in any email or on my computer or written down anywhere.
 
All else aside, I have PIN to Drive enabled in my car. Case closed. It is completely unrelated to any of my personal information. Some hacker has a 1 in 10,000 chance of guessing it. And it isn't in any email or on my computer or written down anywhere.


Uh, you realize they can disable PIN to drive if they have your tesla.com login info, right?

PIN to drive is 0 protection at all against that. That's kind of a major point of the video.