Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A malicious interaction doesn't need to be a remote drive scenario.

One could see non-removable way points being set in software. Door and window controls locked out. Radio tuned to the most obnoxious playlist possible.

There are numerous ways a malicious interaction could play out, none of which requires 'remote drive' capability.

These are immediate, in the moment, examples with no forethought or planning. Imagine how interesting an actual attacker could make a malicious interaction, or millions of those interactions.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: