• 0 Posts
  • 61 Comments
Joined 1 year ago
cake
Cake day: June 11th, 2023

help-circle





  • Western manufacturing tends to be much more automation heavy. Chinese manufactures don’t bother with buying a $100k machine that can make a car part when they can just hire 10 guys at $10k/yr to make that same part with a $50 drill press and some hand files.

    It’s not that it all strictly balances out, but if we actually gave a shit we could potentially be cost competitive for a lot of price brackets, especially given the costs to move whole ass cars across the Pacific.

    Bear in mind these sub $10k Chinese EVs are not something US consumers would really be interested in buying, they are basically tiny car shaped golf carts with extremely minimalist feature sets. Think ‘no audio system at’ all type interiors.







  • If you absolutely have to hand over your phone, turn it off completely, like hold the power button and then tap the off icon. That will dump any keys out of RAM, which is why it always requires the full password to unlock when you turn it back on. Both in terms of how your phone works and the leaks we’ve seen, the cracking tools the police have are overall significantly less likely to be successful when used on a phone that’s been turned off and not unlocked since.

    Also, IIRC iphones have a feature where they will dump at least some of the system keys from RAM if you push the lock button five times. I’d still trust fully off more but that’s easier to do covertly.







  • Intrinsically/semantically no but the expectation is that the texts are encrypted at rest and the keys are password and/or tpm+biometric protected. That’s just how this works at this point. Also that’s the government standard for literally everything from handheld devices to satellites (yes, actually).

    At this point one of the most likely threat vectors is someone just taking your shit. Things like border crossings, rubber stamped search warrants, cops raid your house because your roommate pissed them off, protests, needing to go home from work near a protest, on and on.


  • RF analysis is kinda difficult, you’d need to take the car out into the middle of nowhere and have access to fairly good equipment. A tinySA would maybe work if you’re very patient but data transmissions are generally very bursty so it may be difficult to nail down where it’s coming from in a sane amount of time.

    One option would be to try to figure out if there are any FCC filings for your car. All filings will have pictures of whatever module is being used and what antenna systems it uses which may give you a good idea of where it is and what it looks like. There should be an FCC ID mentioned somewhere at the beginning or end of the cars manual. Googling that should bring up some stuff.