One Article Review

Accueil - L'article:
Source ErrataRob.webp Errata Security
Identifiant 359161
Date de publication 2017-04-26 00:40:17 (vue: 2017-04-26 00:40:17)
Titre "Fast and Furious 8: Fate of the Furious"
Texte So "Fast and Furious 8" opened this weekend to world-wide box office totals of $500,000,000. I thought I'd write up some notes on the "hacking" in it. The tl;dr version is this: yes, while the hacking is a bit far fetched, it's actually more realistic than the car chase scenes, such as winning a race with the engine on fire while in reverse.[SPOILERS]Car hackingThe most innovative cyber-thing in the movie is the car hacking. In one scene, the hacker takes control of the cars in a parking structure, and makes them rain on to the street. In another scene, the hacker takes control away from drivers, with some jumping out of their moving cars in fear.How real is this?Well, today, few cars have a mechanical link between the computer and the steering wheel. No amount of hacking will fix the fact that this component is missing.With that said, most new cars have features that make hacking possible. I'm not sure, but I'd guess more than half of new cars have internet connections (via the mobile phone network), cameras (for backing up, but also looking forward for lane departure warnings), braking (for emergencies), and acceleration.In other words, we are getting really close.As this Wikipedia article describes, there are levels for autonomous cars. At level 2 or 3, cars get automated steering, either for parking or for staying in the lane. Level 3 autonomy is especially useful, as it means you can sit back and relax while your car is sitting in a traffic jam. Higher levels of autonomy are still decades away, but most new cars, even the cheapest low end cars, will be level 3 within 5 years. That they make traffic jams bearable makes this an incredibly attractive feature.Thus, while this scene is laughable today, it'll be taken seriously in 10 years. People will look back on how smart this movie was at predicting the future.Car hacking, part 2Quite apart from the abilities of cars, let's talk about the abilities of hackers.The recent ShadowBrokers dump of NSA hacking tools show that hackers simply don't have a lot of range. Hacking one car is easy -- hacking all different models, makes, and years of cars is far beyond the ability of any hacking group, even the NSA.I mean, a single hack may span more than one car model, and even across more than one manufacturer, because they buy such components from third-party manufacturers. Most cars that have cameras buy them from MobileEye, which was recently acquired by Intel.  As I blogged before, both my Parrot drone and Tesla car have the same WiFi stack, and both could be potential hacked with the same vulnerability. So hacking many cars at once isn't totally out of the question.It's just that hacking all the different cars in a garage is completely implausible.God's EyeThe plot of the last two movies as been about the "God's Eye", a device that hacks into every camera and satellite to view everything going on in the world.First of all, all hacking is software. The idea of stealing a hardware device in order enable hacking is therefore (almost) always fiction. There's one corner case where a quantum chip fact
Notes
Envoyé Oui
Condensat $500  as 000 2quite abilities ability about abused acceleration acquired across actually aim aimed airplane airplanes airplanethe all all the almost aloft along already also always amazon amount another antartica any anyway apart are are levels around article attractive automated autonomous autonomy away aws azure back backing backup bandwidth bases bearable because become been before behind being better between beyond billion bit bits blind blogged blow both botnet box braking broadcast building built but buy camera cameras can capabilities car cars case catch centers change changes changing chase cheapest chemtrail chip chips cipher close cloud communication companies completely component components compression compute computer computers concerned conclusionin connections contrail control controlled controlling conversely cool corner could course cover crunching cyber data day days debunking decades demonstrated departure describes detect deus device devices different disable disbelief doesn don drivers driving drone earth easy effect effects either electronics elsewhere emergencies emp emps enable end engine entire especially even every everyone everything evil exaggerated exist explosively explosives extraordinary eye eyethe face faces fact factoring far fast fate fear feature features fetched fiction fictional films/tv find fire firewall firewalls first fix flies flood flux form forward from front full furious future garage generators get getting ghost given god gody going goto group guess hack hacked hacker hackers hacking hackingthe hacks had half hardware has have haven headquarters heavy her hero hiding high higher himalayas his how however hundreds hypothetical idea implausible impossible incredibly indeed innovative instead intel internet isn its jam jams jumping just know lair: landing lane laptop last laughable least left let level levels license like likewise link links locally look looking lot low machina major make makes making manufacturer manufacturers many may mean means mechanical microsoft might millions mirai miss missile missing mobile mobileeye model models months more moreover most movie movies moving much named need netflix network neural new noaa non nonsense nor norm not notes nsa nuclear number office offline once one ones only opened operating order other out outline owners pages parking parrot part party passed people phone pictures plane planet plates plot possible potential power powered powerful predicting previously process processing protected providers pulse pulsessmall pumped quantum question race rackspace rain range rapidly reach reached real realistic realistically really recent recently recognize relax remote replace resolution results reverse rsa rudimentary said same satellite satellites scene scenes secret security see seen send seriously shadowbrokers dump show siberia simple simply since single sit sitting skills small smart software some something soon sources span spend spoilers spots stack stayed staying steadily stealing steering store stream streaming streams street structure submarine such supercomputers supervillain sure surface surveillance taken takes taking talk target tasked technology tesla than that them then there therefore these they thing things third this: though thought thousands thus tibet time tipped tl;dr today tools totally totals track tracked tracking traffic two unless unlikely unrealistic upgraded upload uploaded used useful uses using version video videos videos/pictures view villain vulnerability warnings way weapons weather webpages websites weekend well weren wheel where which wholly wide wifi wikipedia will willing winning within won words work world wormed would write writing year years your
Tags
Stories Tesla
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: