Nov. 28, 2023, 6:43 a.m. | /u/speederaser

cybersecurity www.reddit.com

A colleague told me:

1. It is very simple to sniff an over-the-air update out of the air and steal the file. The file could then be used to program an exact copy of the device. For example, one could steal Tesla's AI driving software via this method.
2. The file generally is a .hex file and cannot be de-compiled to see the actual code and modify it.

Neither of us being cyber experts, I am wondering if either of …

air copy cybersecurity device driving file ota program simple sniffing software steal tesla update updates

Azure DevSecOps Cloud Engineer II

@ Prudent Technology | McLean, VA, USA

Security Engineer III - Python, AWS

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India

SOC Analyst (Threat Hunter)

@ NCS | Singapore, Singapore

Managed Services Information Security Manager

@ NTT DATA | Sydney, Australia

Senior Security Engineer (Remote)

@ Mattermost | United Kingdom

Penetration Tester (Part Time & Remote)

@ TestPros | United States - Remote