SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Why Cars Need Free Software
          Alison Chaiken, she-devel.com, March 24 2012



“no data are recorded by the EDR under normal driving
  conditions and no personal data . . . are recorded.
However, other parties, such as law enforcement, could
  combine the EDR data with the type of personally
   identifying data routinely acquired during a crash
                      investigation.”
            Source: Insurance Institute for Highway Safety,
             http://www.iihs.org/research/qanda/edr.html
Publishing my own source with Personal Genome Project




             Feel free to fork and improve me!
Our transportation system is

            Dangerous
                           Loud!!!
           Time-wasting          Polluting



because until now individuals had little power to change it.

                                     Goal: driver empowerment
 Now: driver distraction
                                     Goal: driver augmentation
Same Old Topics



●   Security
●   Privacy
●   Personal empowerment



              reappear on a new platform.
What is “in-vehicle infotainment”?




                                    Courtesy Tata Consultancy Services




What “infotainment” calls to mind    What IVI could be
Status of Automotive Free Software
              Manufacturer                        Confirmed Operating system

Fiat-Chrysler Blue&Me (500, Delta), Kia Uvo, Microsoft Windows Embedded Automotive
BYD
                 Ford (all?)                 MyTouch/Sync-Microsoft; OpenXC-Android

 General Motors/Cadillac User Experience            MontaVista's GNU/Linux

      Geely (China); Hawtai (China)          GNU/Linux: Moblin (MeeGo predecessor)

             Renault R-Link                                  Android

Honda (Accord, Odyssey, Pilot), Audi, BMW
(7-series and M models), Chrysler, Daewoo,
    GM (OnStar), Hyundai, Land Rover,                         QNX
    Porsche, Saab (9-3) Renault (SM7)


           Linux Foundation members: Toyota, Pelagicore, Symbio, Tieto
           Automotive Linux Summit 2011 presenters: Toyota, Nissan, BMW
           MeeGo Conference 2011 presenter: Nissan
           Volkswagen has a pilot using Maemo (GNU/Linux).
Current Automotive Security Situation is Shaky




                                    Source: NY Times




  Source: http://www.autosec.org/
Gateways pass information freely among subnets




                                            Wireless!
Published UWa/UCSD automotive exploit
                           http://www.autosec.org/

●   Use GNU Radio to break in via wireless tire pressure sensors (or FM
    radio, or keyless entry …).


●   Discover all of 8-byte codes by “fuzzing” attack or simply sniff bus
    traffic.


●   Brakes locked and driver controls disabled via use of codes or simple
    DOS attack.


●   But let's not make instrumenting our own vehicles illegal, too!
Free culture movement needs to get involved in automotive
How to fix automotive security

●   Automotive network protocols genuinely do need to be
    hardened.

●   Packet filtering, firewalls, cryptographic signing and Android
    “paranoid network” exist.

●   Any approach that posits the necessity to invent new
    technologies is wrong.

●   If NHTSA promulgates new rules, EFF, FSF, SFLC should
    participate!
FSF is on the vanguard again




New York Times, June 23 2011
Ongoing mobile data privacy battle


“For crashes that don't involve litigation, especially
when police or insurers are interested in assessing
fault, insurers may be able to access the EDRs in their
policyholders' vehicles based on provisions in the
insurance contract requiring policyholders to
cooperate with the insurer. However, some states
prohibit insurance contracts from requiring
policyholders to consent to access.”

            Source: Insurance Institute for Highway Safety,
            http://www.iihs.org/research/qanda/edr.html
Privacy Guarantees in Car Environment

●   JM1BK3437512345678
                Vehicle Identifier Section: a particular car



●   Proposal: encrypt the Vehicle Identifier Section of the VIN so
    that it cannot be remotely transmitted.



●   Require “apps” to request access to VIS.
Federal Motor Vehicle Owners Right to Repair Act



  … requires vehicle manufacturers to provide
  the same service information to independent
  shops that they offer to their franchised dealers.
  … auto manufacturers protect their proprietary
  vehicle repair information, requiring consumers
  to bring their cars to the dealer for expensive
  repairs. … allows independent mechanics to
  compete fairly with dealerships …



           Source: Congresswoman Anna Eshoo
MA “Right to Repair” Initiative 2012
Vehicle data example: Ford's Fuel Efficiency Challenge




         Owner-empowering vehicle-data-mining ideas:
         http://tinyurl.com/7oegrj7
Quality community HW and SW already available




     http://tinyurl.com/7wngdsj, http://tinyurl.com/7ttz24h
What does it mean to “own” data?

The creator of the device that generates data that I own must
                 provide, as a bare minimum:

      “any methods, procedures, authorization keys, or
         other information required” to read the data

                             and

    “information provided [ . . . ] must be in a format that
    is publicly documented (and with an implementation
   available to the public in source code form), and must
      require no special password or key for unpacking,
                     reading or copying.”
Free software community responds to embedded challenges
Summary

●   Old battles are renewed in new arena.


●   Proprietary interests will deny device owners access to their
    data with the excuse of protecting public safety.


●   Proprietary interests will claim that security by obscurity is
    better than proven network security standards.


●   Engineering implementers need the wise counsel of those who
    understand the Law.
CFR PART 563—EVENT DATA RECORDERS

“Each manufacturer of a motor vehicle
equipped with an EDR shall ensure by licensing
agreement or other means that a tool(s) is
commercially available that is capable of
accessing and retrieving the data stored in the
EDR that are required by this part. The tool(s)
shall be commercially available not later than
90 days after the first sale of the motor vehicle
for purposes other than resale.”
                source: NHTSA website

Más contenido relacionado

Similar a Why Cars Need Free Software

Automotive Free Software 2013: "Right to Repair" and Privacy
Automotive Free Software 2013: "Right to Repair" and PrivacyAutomotive Free Software 2013: "Right to Repair" and Privacy
Automotive Free Software 2013: "Right to Repair" and Privacy
Alison Chaiken
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
Tyler Cragg
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Mahbubul Alam
 
Developing automotive Linux
Developing automotive LinuxDeveloping automotive Linux
Developing automotive Linux
Alison Chaiken
 
connected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackers
Christopher Porter
 
Connected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for Hackers
Nick Rossmann
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
IJCI JOURNAL
 

Similar a Why Cars Need Free Software (20)

Automotive Free Software 2013: "Right to Repair" and Privacy
Automotive Free Software 2013: "Right to Repair" and PrivacyAutomotive Free Software 2013: "Right to Repair" and Privacy
Automotive Free Software 2013: "Right to Repair" and Privacy
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
 
Connected Car Investment Thesis
Connected Car Investment ThesisConnected Car Investment Thesis
Connected Car Investment Thesis
 
Automotive Linux, Cybersecurity and Transparency
Automotive Linux, Cybersecurity and TransparencyAutomotive Linux, Cybersecurity and Transparency
Automotive Linux, Cybersecurity and Transparency
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
 
Developing automotive Linux
Developing automotive LinuxDeveloping automotive Linux
Developing automotive Linux
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
Connected car slides
Connected car slidesConnected car slides
Connected car slides
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
connected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackersconnected-cars-the-open-road-for-hackers
connected-cars-the-open-road-for-hackers
 
Connected Cars - The Open Road for Hackers
Connected Cars - The Open Road for HackersConnected Cars - The Open Road for Hackers
Connected Cars - The Open Road for Hackers
 
Advanced Hmi Autotechinsider White Paper 11 10
Advanced Hmi Autotechinsider White Paper 11 10Advanced Hmi Autotechinsider White Paper 11 10
Advanced Hmi Autotechinsider White Paper 11 10
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19
 
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th..."Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Blockchain Based Car Rental App
Blockchain Based Car Rental AppBlockchain Based Car Rental App
Blockchain Based Car Rental App
 
The Autonomous Revolution of Vehicles and Transportation
The Autonomous Revolution  of Vehicles and TransportationThe Autonomous Revolution  of Vehicles and Transportation
The Autonomous Revolution of Vehicles and Transportation
 

Más de Alison Chaiken

Not breaking userspace: the evolving Linux ABI
Not breaking userspace: the evolving Linux ABINot breaking userspace: the evolving Linux ABI
Not breaking userspace: the evolving Linux ABI
Alison Chaiken
 

Más de Alison Chaiken (20)

Not breaking userspace: the evolving Linux ABI
Not breaking userspace: the evolving Linux ABINot breaking userspace: the evolving Linux ABI
Not breaking userspace: the evolving Linux ABI
 
Supporting SW Update via u-boot and GPT/EFI
Supporting SW Update via u-boot and GPT/EFISupporting SW Update via u-boot and GPT/EFI
Supporting SW Update via u-boot and GPT/EFI
 
Two C++ Tools: Compiler Explorer and Cpp Insights
Two C++ Tools: Compiler Explorer and Cpp InsightsTwo C++ Tools: Compiler Explorer and Cpp Insights
Two C++ Tools: Compiler Explorer and Cpp Insights
 
V2X Communications: Getting our Cars Talking
V2X Communications: Getting our Cars TalkingV2X Communications: Getting our Cars Talking
V2X Communications: Getting our Cars Talking
 
Practical Challenges to Deploying Highly Automated Vehicles
Practical Challenges to Deploying Highly Automated VehiclesPractical Challenges to Deploying Highly Automated Vehicles
Practical Challenges to Deploying Highly Automated Vehicles
 
Linux: the first second
Linux: the first secondLinux: the first second
Linux: the first second
 
Functional AI and Pervasive Networking in Automotive
 Functional AI and Pervasive Networking in Automotive Functional AI and Pervasive Networking in Automotive
Functional AI and Pervasive Networking in Automotive
 
Flash in Vehicles: an End-User's Perspective
Flash in Vehicles: an End-User's PerspectiveFlash in Vehicles: an End-User's Perspective
Flash in Vehicles: an End-User's Perspective
 
Linux: the first second
Linux: the first secondLinux: the first second
Linux: the first second
 
IRQs: the Hard, the Soft, the Threaded and the Preemptible
IRQs: the Hard, the Soft, the Threaded and the PreemptibleIRQs: the Hard, the Soft, the Threaded and the Preemptible
IRQs: the Hard, the Soft, the Threaded and the Preemptible
 
LISA15: systemd, the Next-Generation Linux System Manager
LISA15: systemd, the Next-Generation Linux System Manager LISA15: systemd, the Next-Generation Linux System Manager
LISA15: systemd, the Next-Generation Linux System Manager
 
Automotive Grade Linux and systemd
Automotive Grade Linux and systemdAutomotive Grade Linux and systemd
Automotive Grade Linux and systemd
 
Tuning systemd for embedded
Tuning systemd for embeddedTuning systemd for embedded
Tuning systemd for embedded
 
Systemd for developers
Systemd for developersSystemd for developers
Systemd for developers
 
Developing Automotive Linux
Developing Automotive LinuxDeveloping Automotive Linux
Developing Automotive Linux
 
Systemd: the modern Linux init system you will learn to love
Systemd: the modern Linux init system you will learn to loveSystemd: the modern Linux init system you will learn to love
Systemd: the modern Linux init system you will learn to love
 
Technology, Business and Regulation of the Connected Car
Technology, Business and Regulation of the Connected CarTechnology, Business and Regulation of the Connected Car
Technology, Business and Regulation of the Connected Car
 
Best practices for long-term support and security of the device-tree
Best practices for long-term support and security of the device-treeBest practices for long-term support and security of the device-tree
Best practices for long-term support and security of the device-tree
 
The “Telematics Horizon” V2V and V2I Networking
The “Telematics Horizon” V2V and V2I NetworkingThe “Telematics Horizon” V2V and V2I Networking
The “Telematics Horizon” V2V and V2I Networking
 
Addressing the hard problems of automotive Linux: networking and IPC
Addressing the hard problems of automotive Linux: networking and IPCAddressing the hard problems of automotive Linux: networking and IPC
Addressing the hard problems of automotive Linux: networking and IPC
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Why Cars Need Free Software

  • 1. Why Cars Need Free Software Alison Chaiken, she-devel.com, March 24 2012 “no data are recorded by the EDR under normal driving conditions and no personal data . . . are recorded. However, other parties, such as law enforcement, could combine the EDR data with the type of personally identifying data routinely acquired during a crash investigation.” Source: Insurance Institute for Highway Safety, http://www.iihs.org/research/qanda/edr.html
  • 2. Publishing my own source with Personal Genome Project Feel free to fork and improve me!
  • 3. Our transportation system is Dangerous Loud!!! Time-wasting Polluting because until now individuals had little power to change it. Goal: driver empowerment Now: driver distraction Goal: driver augmentation
  • 4. Same Old Topics ● Security ● Privacy ● Personal empowerment reappear on a new platform.
  • 5. What is “in-vehicle infotainment”? Courtesy Tata Consultancy Services What “infotainment” calls to mind What IVI could be
  • 6. Status of Automotive Free Software Manufacturer Confirmed Operating system Fiat-Chrysler Blue&Me (500, Delta), Kia Uvo, Microsoft Windows Embedded Automotive BYD Ford (all?) MyTouch/Sync-Microsoft; OpenXC-Android General Motors/Cadillac User Experience MontaVista's GNU/Linux Geely (China); Hawtai (China) GNU/Linux: Moblin (MeeGo predecessor) Renault R-Link Android Honda (Accord, Odyssey, Pilot), Audi, BMW (7-series and M models), Chrysler, Daewoo, GM (OnStar), Hyundai, Land Rover, QNX Porsche, Saab (9-3) Renault (SM7) Linux Foundation members: Toyota, Pelagicore, Symbio, Tieto Automotive Linux Summit 2011 presenters: Toyota, Nissan, BMW MeeGo Conference 2011 presenter: Nissan Volkswagen has a pilot using Maemo (GNU/Linux).
  • 7. Current Automotive Security Situation is Shaky Source: NY Times Source: http://www.autosec.org/
  • 8. Gateways pass information freely among subnets Wireless!
  • 9. Published UWa/UCSD automotive exploit http://www.autosec.org/ ● Use GNU Radio to break in via wireless tire pressure sensors (or FM radio, or keyless entry …). ● Discover all of 8-byte codes by “fuzzing” attack or simply sniff bus traffic. ● Brakes locked and driver controls disabled via use of codes or simple DOS attack. ● But let's not make instrumenting our own vehicles illegal, too!
  • 10. Free culture movement needs to get involved in automotive
  • 11. How to fix automotive security ● Automotive network protocols genuinely do need to be hardened. ● Packet filtering, firewalls, cryptographic signing and Android “paranoid network” exist. ● Any approach that posits the necessity to invent new technologies is wrong. ● If NHTSA promulgates new rules, EFF, FSF, SFLC should participate!
  • 12. FSF is on the vanguard again New York Times, June 23 2011
  • 13. Ongoing mobile data privacy battle “For crashes that don't involve litigation, especially when police or insurers are interested in assessing fault, insurers may be able to access the EDRs in their policyholders' vehicles based on provisions in the insurance contract requiring policyholders to cooperate with the insurer. However, some states prohibit insurance contracts from requiring policyholders to consent to access.” Source: Insurance Institute for Highway Safety, http://www.iihs.org/research/qanda/edr.html
  • 14. Privacy Guarantees in Car Environment ● JM1BK3437512345678 Vehicle Identifier Section: a particular car ● Proposal: encrypt the Vehicle Identifier Section of the VIN so that it cannot be remotely transmitted. ● Require “apps” to request access to VIS.
  • 15. Federal Motor Vehicle Owners Right to Repair Act … requires vehicle manufacturers to provide the same service information to independent shops that they offer to their franchised dealers. … auto manufacturers protect their proprietary vehicle repair information, requiring consumers to bring their cars to the dealer for expensive repairs. … allows independent mechanics to compete fairly with dealerships … Source: Congresswoman Anna Eshoo
  • 16. MA “Right to Repair” Initiative 2012
  • 17. Vehicle data example: Ford's Fuel Efficiency Challenge Owner-empowering vehicle-data-mining ideas: http://tinyurl.com/7oegrj7
  • 18. Quality community HW and SW already available http://tinyurl.com/7wngdsj, http://tinyurl.com/7ttz24h
  • 19. What does it mean to “own” data? The creator of the device that generates data that I own must provide, as a bare minimum: “any methods, procedures, authorization keys, or other information required” to read the data and “information provided [ . . . ] must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.”
  • 20. Free software community responds to embedded challenges
  • 21. Summary ● Old battles are renewed in new arena. ● Proprietary interests will deny device owners access to their data with the excuse of protecting public safety. ● Proprietary interests will claim that security by obscurity is better than proven network security standards. ● Engineering implementers need the wise counsel of those who understand the Law.
  • 22. CFR PART 563—EVENT DATA RECORDERS “Each manufacturer of a motor vehicle equipped with an EDR shall ensure by licensing agreement or other means that a tool(s) is commercially available that is capable of accessing and retrieving the data stored in the EDR that are required by this part. The tool(s) shall be commercially available not later than 90 days after the first sale of the motor vehicle for purposes other than resale.” source: NHTSA website