Hackers at Pwn2Own Stand a Chance to Win Tesla Model 3 Sedan
Reviews, Tech

Hackers at Pwn2Own Stand a Chance to Win Tesla Model 3 Sedan 

Pwn2Own, a computer hacking competition that is held annually, has included the Tesla Model 3 sedan among its categories. This is the first time a car has been included in the hacking content. Anyone who is able to hack the car’s vulnerable points will win the car.

The official site of Pwn2Own has listed the parts of Tesla Model 3 that should be targeted by the contestants competing for it.

The electronic car can be set to autopilot mode using computer programming, the car makers have listed the car in the competition to judge the programming flaws of the model. David Lau, Tesla vehicle software chief, said the company is looking forward to see if anyone could hack the Tesla car or not.

“We look forward to learning about and rewarding great work in Pwn2Own so that we can continue to improve our products and our approach,” Lau said.

As of now, categories listed to hack and win the Tesla Model 3 are:

  • Modem or Tuner
  • Wi-Fi or Bluetooth
  • Infotainment
  • Gateway, Autopilot or VCSEC
  • Autopilot, Denial of Service
  • Key Fobs or Phone-as-Key
  • Persistence
  • CAN Bus

Generally, the hacking competition wants the contestants to operate the Model 3 from their own unrelated devices through hacking, codes or any malicious software. Alternatively, the persistence and CAN bus categories focus on consistently stopping the car from rebooting its software or getting total control of the sedan’s CAN bus, which is the car’s computer system.

Tesla Model 3 mid-range, rear-wheel drive sedan, is the exact model that hackers can win, once they hack it.

Recently, Elon Musk, Tesla CEO has announced to discontinue the lower-end versions of Model S and X. He also hinted on carrying out SpaceX test launches in February or March this year.

At present, the spaceship projects are being tested to optimise the engines and parts that would work well for the test flight.

Related posts

Leave a Reply

Required fields are marked *