And when all the used cars are gone and I’m forced to buy one of these I’ll promptly be destroying the radio transmitters and everything related to this surveillance.
I remember when we discovered that militants in Afghanistan were monitoring Predator video feeds because apparently nobody had ever put in a requirement that the video stream be encrypted.
Militants in Iraq and Afghanistan have intercepted live video feeds from unmanned U.S. Predator drones using $26 off the shelf software made by a Russian company, says a report in the Wall Street Journal.
IIRC that was because the Predator video feeds were intended to be viewed in-theatre by officers right there on the front, and military protocol around encryption keys would have made it so no one at the front would have been able to decrypt the feed.
Considering they were designed in the early 90s, i.e. before public-key cryptography took off with SSL, that explanation always seemed plausible to me.
And when all the used cars are gone and I’m forced to buy one of these I’ll promptly be destroying the radio transmitters and everything related to this surveillance.
It’ll be like the 70s in the US again. Rip out all the bullshit smog stuff and put on a new carb. Because a v8 mustang shouldn’t be making 130hp.
Straight to jail.
Is it actually illegal or is that a joke?
Right away.
the “surveillance” seems to happen on the car locally. Kind of an expansion of current driver attention systems to include impairment detection.
“Local” surveillance happening on the same car computer that’s attached to a SIM card.
Yeah seems safe
It’s local right until the law enforcement gets into Bluetooth range with the right encryption keys to download all of the data for the past year.
Bold of you to assume any of this will be encrypted.
SSH keys for remote access.
Local storage encryption would be pointless because the keys would be local as well.
I remember when we discovered that militants in Afghanistan were monitoring Predator video feeds because apparently nobody had ever put in a requirement that the video stream be encrypted.
https://www.networkworld.com/article/769321/insurgents-intercept-video-feeds-from-u-s-drones-using-26-software-report-says.html
IIRC that was because the Predator video feeds were intended to be viewed in-theatre by officers right there on the front, and military protocol around encryption keys would have made it so no one at the front would have been able to decrypt the feed.
Considering they were designed in the early 90s, i.e. before public-key cryptography took off with SSL, that explanation always seemed plausible to me.