Automotive systems communicate over a CAN [1] bus, not ethernet. In fact, this bus is usually physically separated between drive-critical bus (which controls things like ABS) and "comfort" bus (such as electric window controls, central door locks, wheel-mounted audio controls). Ethernet has none of the industrial strength qualities that make CAN a valid automotive control bus, such as signal hardening and real-time guarantees.
As far as these users have found, this ethernet port is connected to the infotainment system: the 17" display.
I would be deeply disappointed in Tesla if the infotainment system can modify drive-control devices with anything less than signed binaries and commands. As an aside, I wonder what the legal requirements of such safeties are.
See Michael Hastings conspiracy theories: http://www.huffingtonpost.com/2013/06/24/michael-hastings-ca...
1) The entertainment system generally has read-only access to the CAN bus via an intermediary DCU. Even if you were able to "jailbreak" it, you wouldn't be able to modify the CAN.
2) The control unit(s) that actually have the ability to modify things like brakes, maximum speed settings, etc. are ECUs (http://en.wikipedia.org/wiki/Electronic_control_unit) and are entirely separate from the entertainment system.
3) Updates to vehicle-critical systems generally never even go through the entertainment system. They are sent over the air to the car's receiver (usually a kind of DCU), and are processed outside the purview of the entertainment system. The only thing the entertainment system can do is schedule the download and read the progress of the update.
It's interesting to see that Ethernet is used to connect the infotainment displays, but this isn't really a security concern as far as I can see. It just means we'll probably see some mods for the displays in the future, like turning off the YouTube lockout or enabling different data displays.
You could even run the service diagnostics on the entertainment system and avoid the need for extra hardware in repair shops.
I'm still surprised people think like this. We had 60+ years of technology hacking to learn that if it is not airgapped, it can be hacked. And even if it is, it probably still can be (cf. Stuxnet). So while I doubt Tesla is using Ethernet to control critical car systems, I also don't think that they can't be tinkered with using that port if someone cares hard enough to try.
http://www.dspace.com/de/gmb/home/products/newprod/microauto... (Table: Host-Interface = Ethernet)
Apple is mainly a Design firm, they are good at making things look pretty... not much else..
[1] http://www.broadcom.com/products/Physical-Layer/BroadR-Reach... [2] http://www.eetimes.com/document.asp?doc_id=1315425
The sketchy things: Jailbreaking a car seems pretty dangerous, especially since as far as I'm aware, the electronic systems control things including the brake. I know this only because Tesla recently released a software update that added "hill assist" which will hold the brake in place for 1 second when at a certain incline to avoid rolling back. Imagine a malicious software update that disabled the brake! Personally, I would jailbreak a phone, but not a car. :) HOPEFULLY the system the ethernet port provides access to is firewalled out of being able to update any software (i.e. the software update mechanism is some other device), but who knows.
The phone home can also be considered sketchy, but any Tesla owner is well aware the car pings home and relays diagnostic data to Tesla. At the very least, Tesla owners know it must ping home to check for updates periodically.
If anything, I thought it was kind of cool that Tesla engineers detected it and reached out so quickly. Imagine if you weren't tampering with your car and it WAS a high-tech attacker. It is good to know that they can detect the basics.
According to the article, the car's network consists of three devices - the centre console, the dashboard, and one unknown device. There's no way that the whole car has only three computers.
My guess is that this ethernet network is only for the user interface. I'd also guess that the unknown device serves as a gateway (and, hopefully, a firewall) between the critical systems of the car and the car's UI.
MISRA Compliance...Coming soon in Ubuntu 149.04 Zany Zealot!!</s>
While you may not be comfortable jailbreaking your own car, you might also not be comfortable replacing your own brakes? Do you think my replacing the brakes of my own car would also be sketchy? I am a better programmer than I am a car mechanic. Also, after-market mods which reprogram the engine have been around for a while, so it's not like people do things like this already.
First, locate the hood, second, use the release to pop it. Locate the master cylinder, and the hose running to the engine, cut it. Now the brakes don't work very well. Locate the hose not running to the engine, cut that, now the brakes don't work at all.
Imagine that any person strong enough to operate side cutters can hack into your car and disable the brakes.
With high-tech cars, an attacker could hack every car of the same model. With thousands of Teslas on the road, I think it merits a higher concern than somebody with side cutters.
I thought it was obvious. Next time I'll let it go unsaid..
So long as you don't cause any damage they can't void your warranty in the US thanks to the Magnuson–Moss Warranty Act.
I mean, could you imagine if a car manufacturer took this attitude toward car owners who were exploring the car's transmission, which is clearly just as critical to the car's safety as the car computer system?
My view of Tesla just sank a notch (but I still want one).
Edit: Actually, I thought about it a bit, and I actually don't want one anymore if this is the attitude that prevails inside the company. For the same reason that I don't want any Apple products. I'm far from a Stallman acolyte, but I'll be damned if I'll buy from a company that wants to forbid me from hacking on hardware that I have purchased and own.
Therefore I thinks Tesla acts as responsible as they should when detecting and reacting upon active (as opposed to passively analyzing radio transmissions) manipulation of their cars inner systems. As other comments have pointed out you don't want to find out about bugs in critical systems triggered by your entertainment system jailbreak when driving with 100km/h+ on a crowded highway.
Your phone hack / mod fails badly => Buy a new phone Your car hack fails badly => People die
It's simply not worth it.
Imagine headlines if someone would be killed due to not correctly operating component because the owner used a buggy mod.
But people are well within the right to do so.
Whoops.
Also, looks like Tesla has got international deals with mobile carriers for data flatrates. I'm looking forward to see the first guy stream youtube or youp*rn on the dashboard :D
I wonder if they ship coreutils?
http://www.teslamotorsclub.com/showthread.php/28185-Successf...
Interesting in particular is one poster's claim that Tesla gave him a seemingly-dismayed call...
http://www.teslamotorsclub.com/showthread.php/28185-Successf...
I would like an option to contact home base to verify that all files and configurations in my car are exactly like their suppose to be, else either disable the car or download the correct software.
Maybe a way to enable a developer mode which can only be used on a non-public road.
I just can't imagine modifying an electric vehicles computers and settings for anything useful. Please offer some suggestions if you can.
http://www.teslamotorsclub.com/attachment.php?attachmentid=2...
I just don't think it's worth compromising safety and implementing more systems (to regular where the modified cars are driven) to satisfy the small percentage of people who want to use a Model S as a serious track car.
It's already pretty competitive on the track https://www.youtube.com/watch?v=VLCdP6sMN9k
One wreck from a modified Model S would be disastrous for Tesla, it's just not worth it at this point in my opinion.
Given how critical the software already is, I would be surprised if there isn't a system already in place, that car companies are required to put in, that can use to verify the software for any car.
Wouldn't a real industrial espionage operation disconnect or Faraday cage the vehicle's remote communications capability as their very first step? If you were trying to reverse engineer Tesla's secrets, would you really care about voiding the warranty?
The title is 'All the things she said', which originally was a #1 Top 40 song by the Russian pop group 'Tatu'. However the picture is definitely not the Russian duo. Is this a German cover version of some sort?
However, a simple YouTube search for the song name turned up a bunch of cover versions. This one matches the length shown (4:17): https://www.youtube.com/watch?v=tytPcvyJASc
The band, Simple Plan, also appears to have five members, which is pretty strong supporting evidence. Strangely, I couldn't find the exact image shown in the Tesla photo.
As a driver who will have to occupy space around people playing with this while driving...F#&*!
Also, the car should not move.