daveo4EV
Well-Known Member
- First Name
- David
- Joined
- Jan 28, 2019
- Threads
- 35
- Messages
- 676
- Reaction score
- 1,037
- Location
- Santa Cruz
- Vehicles
- Macan Turbo,Cayenne Hybrid, 911(s) GT3/Convertable
let's not confuse a delivery method (OTA vs. USB-stick) with the security or relative quality of an update - if a given software update is not secure/stable/bug free via OTA - it's not secure/stable/bug-free via USB-Stick…In the engineering models other manufactures use, it doesn't make much sense to take the risk of OTA code as the car was not designed to be a development model. They prefer the safer method and deliver the update to dealers and let the update be done by a tech.
Porsche bricked 100's to low thousands of Taycan's attempting to update PCM 6.x to 6.x+1 with USB based dealer service techs applying the update…and the only recovery method to fix these bricked Taycan's was to replace key/expensive hardware modules - which were back ordered and hard to source given supply chain constraints - OTA is just a method of delivering software, it has nothing to do with quality/suitability - delivery of low quality software via OTA is no different than low quality software via USB stick…and I've had more problems with dealer applied software than I ever had with any of my Tesla's…
Tesla's software is at least as secure at Apple, Microsoft, Google in terms of integrity and delivery mechanism - vs. the auto-motive platforms that most auto makers are deploying…
I find your analysis confusing and mostly FUD - the 10+ year history of Tesla's software with now literally millions of vehicle's on the road large refutes the majority of your assertions - I also happen to know that Tesla deploys: code, signing, public-key-private-key, SSL and other industry standard security mechanisms that while not impossible to breach are based on technologies that if they are not secure, neither is anything else we're using…
I'm unaware of any large scale hacks available and easily deployable against Tesla, where as we can disable most/nearly-all other maker's vehicle's via numerous hacks via wireless FOB's or even going in through the wireless tire pressure monitor's…
I'd love any evidence or articles discussing major problems with Tesla's security or fall out from OTA updates…