Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There was an article not long ago about a Subaru vuln that allowed anyone to remote start, track, or unlock any new Subaru


Interpretation The First: One does not need to subscribe to enjoy this functionality.

Interpretation The Second: These vehicles are maintained by a corporation that is both greedy and incompetent.


I took my wife's 2020 Crosstrek in for service a couple of years ago.

The service writer told me (and documented) that the car needed rear pads when I came to pick it up.

That's a little weird, I thought.

I took it to a tire place for snows two weeks later. They inspect that shit for the upsell while the wheels are off anyway. Front and rear brakes: fine.

Checked 'em myself. Sure enough, barely worn.

That was the last time that car visited the dealer.

I still have to pull the dash apart to bypass the spy box they never mentioned when selling the car.

These dicks feel they aren't making enough money just making and selling cars they have to do shady shit.

Well fuck that, I won't buy a new one again.


Honda dealer told me I had an oil leak. Odd, never saw oil in my driveway. Said no thanks. A friend mechanic looked at it and said there was no evidence of an oil leak.

Never going to that dealer ever again.


I have this[0] in my cart waiting to pull the trigger. It's supposed to allow you to pull the power from the data communication model, while preserving the functioning of the microphone and front speakers, which are routed through the DCM.

[0]https://www.autoharnesshouse.com/69018.html


Wasn't it the other way round? Subaru was the only manufacturer that wasn't affected, I thought.



I completely forgot about that.

I was thinking of the exploit back from 2023 that effected Acura, Genesis, Honda, Hyundai, Kia, Infiniti, Nissan, and Porsche. I remember it being discussed on HN at the time but I can't find the relevant thread. Here is an article covering it: https://www.securityweek.com/16-car-makers-and-their-vehicle..., at the time.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: