Remote Jeep exploit

I am sure many of you have already seen this article.  If not I
recommend reading it before our F2F meeting next week.  

Having IVI permitted to only access CAN through the APIs we're working
on, provided they are implemented properly and architecture does not
provide ways to circumvent, could reduce this particular attack vector
to a much less alarming read-only privacy concern.

http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
http://www.itmedia.co.jp/enterprise/articles/1507/22/news060.html

-- 
Ted Guild <ted@w3.org>
W3C Systems Team
http://www.w3.org

Received on Wednesday, 22 July 2015 17:24:44 UTC