• KubeRoot@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    3
    ·
    9 hours ago

    Right, but that requires somebody to find and document exploitable firmware revisions, create and distribute hardware/software to exploit them, develop the aftermarket software/hardware, and all that potentially separately for each car model. And then that just becomes a war with the manufacturers, who might try to update their firmware more aggressively, lock things down more, and threaten/sue people working on such things.