Uncategorized

Tesla Hacking: Part 2 – Spoofing Tesla Insurance (Safety Score) Telemetry Data

Shortly after obtaining root access on a Tesla Model 3, Tesla released their ‘Safety Score’, which is an assessment of driving behavior based on a variety of metrics. This data is currently being used for calculating drivers’ Tesla Insurance cost premiums and was previously used to gatekeep entry to the FSD Beta program. Our team […]

Tesla Hacking: Part 2 – Spoofing Tesla Insurance (Safety Score) Telemetry Data Read More »

Tesla Hacking: Part 1 – Obtaining Root on a Tesla Model 3 with Persistent Access

We at SourceHat enjoy Tesla’s vehicles. They become more enjoyable, however, with an increased level of access. By obtaining root access, we gain full control over the car’s infotainment system. And with our persistence method, we retain access to key functions that a rooter can enjoy. Our exploit chain is broken down into three novel

Tesla Hacking: Part 1 – Obtaining Root on a Tesla Model 3 with Persistent Access Read More »

Avoiding Losses In DeFi Staking – Part 1: Tracking Deposits And Rewards

In the ever-evolving realm of decentralized finance (DeFi), the spotlight often falls on yield generation. This concept offers cryptocurrency holders the chance to earn returns on their idle assets. Within DeFi, numerous projects and platforms employ various methods for yield generation, with Staking and Vault/Strategy contracts being among the most prominent. Today, we’ll explore a

Avoiding Losses In DeFi Staking – Part 1: Tracking Deposits And Rewards Read More »

Scroll to Top