With cars now sporting on-board entertainment systems complete with cellular connectivity, hackers in the United Kingdom and the United States have discovered ways to remotely take over the car's computer and override crucial systems, from steering to braking.
After Miller and Valasek decided to focus on the Jeep Cherokee in 2014, it took them another year of hunting for hackable bugs and reverse-engineering to prove their educated guess. It wasn’t until June that Valasek issued a command from his laptop in Pittsburgh and turned on the windshield wipers of the Jeep in Miller’s St. Louis driveway.
Since then, Miller has scanned Sprint’s network multiple times for vulnerable vehicles and recorded their vehicle identification numbers. Plugging that data into an algorithm sometimes used for tagging and tracking wild animals to estimate their population size, he estimated that there are as many as 471,000 vehicles with vulnerable Uconnect systems on the road.
|“A flexible fuel cell electric platform with autonomous capabilities.”|
|Ken Block's Gymkhana|
|Same House, Two Different Cars|
|Every New Car Will Be a Hybrid|
|"You can buy a car, but you don’t own the software in its computers."|
|Folding Laundry Without Arms or Legs|
|“[T]here has never been this kind of financial incentive to make shorter songs.”|
|“There’s now a very large dataset of carefully curated photos of people from roughly 10 years ago and now.”|
|CaptchaTweet: Write Tweets in Captcha Form|
|How to Avoid Jury Duty|
|“A short cut through spacetime allowing for travel over cosmic scale distances in a short period.”|
|“If you fell asleep in 1945 and woke up in 2018 you would not recognize the world around you.”|
|“Huge privacy violations have become commonplace.”|
|Google Map Shows You the Most Photographed Areas of the World|
|“The very fact that apps – like a period tracker or an LED flashlight [app] – share data with Facebook will come as a surprise to many people.”|