The vehicle-to-vehicle technology actually concerns me the most. My big concern is that a malicious hacker might find a way to fool another car on the road into thinking it needs to stop or swerve to avoid another vehicle that the hacker, spoofed. I would definitely want any car using this technology to have other technologies in place to verify that the vehicle-to-vehicle technology is working as expected.
Sometimes software engineers, in their rush to market, ignore important security work, and they often don’t think in terms of crafty, malicious users trying to circumvent their development and what they need to do to prevent these sorts of things.
I’m all for self-driving cars, and I’d love them sooner rather than later, but I really want the automotive industry to take the time to do this right.
We have updated our privacy policy to be more clear and meet the new requirements of the GDPR. By continuing to use our site, you accept our revised Privacy Policy.
The vehicle-to-vehicle technology actually concerns me the most. My big concern is that a malicious hacker might find a way to fool another car on the road into thinking it needs to stop or swerve to avoid another vehicle that the hacker, spoofed. I would definitely want any car using this technology to have other technologies in place to verify that the vehicle-to-vehicle technology is working as expected.
Sometimes software engineers, in their rush to market, ignore important security work, and they often don’t think in terms of crafty, malicious users trying to circumvent their development and what they need to do to prevent these sorts of things.
I’m all for self-driving cars, and I’d love them sooner rather than later, but I really want the automotive industry to take the time to do this right.