Tesla Major Security Vulnerability: Keyless Car Unlocking via BLE Relay Attack

Tesla Major Security Vulnerability: Keyless Car Unlocking via BLE Relay Attack

In a recent cybersecurity study, Tesla’s keyless entry system revealed a major security vulnerability, allowing attackers to unlock a Tesla Model 3 or Model Y within 10 seconds through a BLE (Bluetooth Low Energy) relay attack. The method to execute this attack is not complicated. It merely requires placing a decoding sensing device near the … Read more

An Overview of Tesla’s AMD MCU 3.0

An Overview of Tesla's AMD MCU 3.0

Recently, discussions about Tesla’s AMD vehicle chips have been exceptionally lively. Is AMD really that good? AMD is eternal? Is this a benefit for the party? With the official delivery of the domestic Model Y Performance, the multimedia control unit MCU 3.0 (Media Control Unit) equipped with the AMD main control scheme has officially kicked … Read more

Tesla’s In-Car System: A Gaming Experience on Wheels

Tesla's In-Car System: A Gaming Experience on Wheels

Performance Rivals PS5, Tesla Creates the Strongest In-Car System in Mass Production. After using AMD’s CPU and GPU, Tesla has created the strongest in-car system, outperforming even the laptop you have. Recently, the domestic Tesla Model Y Performance version officially began delivery. Observant owners noticed that the Model Y Performance version has a completely different … Read more

The Dilemma of ADAS and the Bottleneck of Autonomous Driving

The Dilemma of ADAS and the Bottleneck of Autonomous Driving

Introduction: This article is authorized for publication by Zhiche Technology, written by Old Hong. Recently, the State Administration for Market Regulation of China and four other departments held discussions with Tesla. Not to mention autonomous driving, there are even basic safety issues—battery fires, unintended acceleration, and vehicle remote upgrades (OTA), among others. As for automotive … Read more

Understanding Tesla Attack Cases: Hardware Reverse Analysis

Understanding Tesla Attack Cases: Hardware Reverse Analysis

This article is an excellent piece from the KXue Forum, author ID: kxliping 1 Purpose of Analyzing Attack Cases The main purpose of studying attack cases is to understand how attackers breach vehicles and take control of them. In the research on Tesla attacks, Tencent’s Keen Lab has contributed several successful cases, which should ideally … Read more

Silicon Labs: Empowering IoT with Low-Power Bluetooth

Silicon Labs: Empowering IoT with Low-Power Bluetooth

On December 18, the OFweek 2024 (9th) IoT Industry Conference was grandly held at the Dashida Building in Shenzhen.The conference, themed “Digital Future, Smart Connection of Everything”, was organized by the high-tech industry portal OFweek, with OFweek IoT as the organizer. It aims to gather elites from both upstream and downstream of the IoT industry … Read more

Using Tongue Twisters to Improve English Speaking Skills

Using Tongue Twisters to Improve English Speaking Skills

— Tips: Click on the top 【Han Dad in America】 to view past content — Before National Day, I wrote an article introducing how tongue twisters help children with their English speaking. A mother asked if I had any tongue twister recommendations, so today I will discuss this question in detail! In English, tongue twisters … Read more

Common Mispronunciations in English You Should Know

Common Mispronunciations in English You Should Know

When learning English, we often strive to master standard pronunciation, but in reality, even native speakers may not always be very “standard”. Today’s lesson will teach you about words that Americans often “mispronounce”. Is it I can or I can’t? In English, some words have spellings that do not quite match their pronunciation: Spelling and … Read more

Quick Guide to Low Energy Bluetooth (BLE) Product Development

Quick Guide to Low Energy Bluetooth (BLE) Product Development

Recently, due to work requirements, I have been involved in a BLE project and have spent considerable time researching standards and principles to understand the underlying concepts. I have summarized many of the BLE products currently available in the market, practically validating the theory, and have gained quite a bit of insight. Today, I finally … Read more

Functional Allocation of Tesla Model 3 from Controller Pin Definitions – FBCM

Functional Allocation of Tesla Model 3 from Controller Pin Definitions - FBCM

Today is the third article in the series “Functional Allocation of Tesla Model 3 from Controller Pin Definitions” – “FBCM”. Without further ado, let’s get straight to the point. 1. In-Vehicle Network 3 routes of CAN, 4 routes of LIN. Although it does not compare to LBCM (5 routes of CAN, 4 routes of LIN) … Read more