Hackers will get the money and the car for breaking Tesla Model 3

Tesla is trying by all means to protect its electric cars from breaking, and it’s definitely something to work with. Proof of this are numerous — for example, once the hackers from Belgium were able to cheat the system the Tesla Model S and open the car door. To prevent the recurrence of such incidents, the company was awarded the hackers in the amount of $ 15,000 for identifying any program gaps. In 2019, Tesla has gone ahead and announced its willingness to give the Tesla Model 3 to those who will be the winner of the Pwn2Own hacking competition in the category cars.

Автомобиль Tesla Model 3

The Pwn2Own contest has been held since 2007 — in the framework of hackers breaking into laptops, tablets and other equipment and get cash prizes. This year the organizers decided to add a category of cars, and its first representative was chosen Tesla Model 3. Participants will have to find vulnerabilities in the protection system, autopilot and other parts of the software. These systems are responsible for important functions of the car until the lane change, therefore, for a successful exploitation of security vulnerabilities, the participants will receive from 35 000 to 250 000 dollars. The absolute winner in the category of automobiles will get the main prize — the new Tesla Model 3.

We look forward to the results of work under the Pwn2Own and want to promote it for what we can continue to improve our products.

David Lau, Vice President, software

It is worth Recalling that Tesla not only have problems with the software security. Earlier on the Tesla Model 3, it was quite dangerous to drive in the dark right front headlight illuminated the road slightly worse than the left. Fortunately, in July 2018, the company has fixed this problem by installing on the cars new headlights.

How do you think you have a lot of Tesla Model 3 vulnerabilities? An opinion can be expressed in the comments or in our Telegram chat.

Leave a Reply

Your email address will not be published. Required fields are marked *