A team of hackers to succeed in a contest of hackers invaded a tesla Model 3 car, whereas tesla because they found a loophole in the reward they a car. Earlier this year, tesla to form the first car manufacturers involved in Pwn2Own competition where the hacker competition. In order to let hackers looking for car system loopholes and defects, tesla for hackers a Model 3 car.
the hacker competition this week in vancouver, Canada, a group of two hackers hacker & other; Fluoroacetate” Success in the last day of the game Model 3 system vulnerabilities were found.
the team applied materials of Cama and Richard Zhu Model 3 car information system as the breakthrough point, and with the help of a radar system in a JIT holes successfully manipulate the car system. Because they expose the security hole and let the tesla had a chance to improve, so tesla Model 3 reward to them. Besides Fluoroacetate team win in the competition of other awards.
in the past four years, tesla has been on a reward program, and is familiar with, people familiar with the project revealed that tesla had to expose the hackers paid hundreds of thousands of reward system vulnerabilities. Last year, tesla will reward amount to 1 of each hole. 50000 dollars, this also let those who try to find his car is becoming more and more put holes tesla user
tesla said, when the safety of the car for approval in advance research from invasion, company closed to vehicles. Tesla onboard software department deputy director David Lau review their efforts like this: & other; Us from every aspect to ensure that our research and development of cars with the highest safety standards, and we cooperate with security team is crucial for us. ”
he said & other; Start leak reward program since 2014, we constantly increase capital and security researchers to cooperate, ensure that all of the tesla users can benefit from it. We are looking forward to the Pwn2Own competition where can let us find loopholes, so that we can continue to improve our products and method of safety system design. ”
tesla's response is also quite fast, immediately on the hackers found a loophole in the repair. As early as 2016, a white hat hackers of China team in tencent Cohen safety lab remotely through a Wifi hotspot successful invasion of the tesla Model S. The invasion is also considered the tesla vehicles for the first time a remote invasion. In this news before hackers reported the vulnerability to tesla, tesla is quite rapid also introduced a system upgrade.
are peak industrial co. , LTD. , used in gardening tools and original made in generator engine technology, after more than a year of time, has developed its own production of wind and the sun can used inverse appliances, controller and power head; Is peak industrial co. , LTD. Has developed a home of small wind turbines, not only can be combined with solar panels are used together, and the price is about one-third that of solar panels, is quite competitive.