Skip to main content


The most thought proving article I have read this week:

A Norwegian bus company wants to know if their buses could be abused by China in the case of war.

So they drive two buses deep into a limestone mine to isolate them from the internet and forensically investigate how they work.

In the mine, investigators discover a Chinese kill switch which could destroy all Chinese buses.

In Denmark, that is 57 percent of the bus fleet.

Source (Danish):

zetland.dk/historie/svNwC3c5-a…

in reply to Randahl Fink

Sensitive content

in reply to MarjorieR

@titanmanfred just to amplifiy this point. Nearly all internet connected devices have a kill switch.

Teslas have a kill switch
Your ISP supplied router has a kill switch
Your phone has a kill switch
Your Windows computer has a kill switch
Your programmable bed has a kill switch
Your robot vacuum has a kill switch
Your MS Mail account and your Bank account has a kill switch (ask ICC judges)
Your data in the US owned cloud (even if hosted in Europe) has a kill switch
F35 planes, NATO donated to Ukraine, have a kill switch.
Your Polish locomotive has a kill switch (activated if you try and use an independent repair shop).
All these have been mentioned in the news and in the Fediverse recently.

Most of these are controlled by US or Chinese companies. Particularly with Trump in charge and alll the tech Billionaires subbing him are you sure that the American ones are less lilkely to be used against you by the USAian companies than the Chinese companies to disable your kit and maybe your life?a

This entry was edited (1 day ago)
in reply to MarjorieR

Sensitive content

in reply to Ed Bridges

@DrEdBridges @titanmanfred @marjolica you should probably save that one for when linux isn't just mentioned in passing and also relevant to the discussion.
in reply to Randahl Fink

US made John Deere tractors also have a kill switch and it has been used to disable some of them (in this case tractors stolen by Russian troops) remotely:

orchardandvine.net/news/john-d…

edition.cnn.com/2022/05/01/eur…

(EDIT: this was also mentioned briefly in the Danish article linked above)

This entry was edited (1 day ago)
in reply to Randahl Fink

To be honest: I'd love a broad scale analysis of this. Few days ago it as a vacuum cleaner, now buses...

Test this in all things. From mobile phones to cars (don't care if Chinese, US or German), smart beds (well... actually leave these ones out. Who buys a bed that needs internet?!), switches, routers, water pumps, ....

I bet they'll find stuff in too many places.

in reply to Randahl Fink

And everything for critical infrastructure (water supply etc). The rest are details.
in reply to Randahl Fink

there is a little thing called a specification when you buy something. You need to be absolutely sure you have full control over your technology you own.
Some people might find open hardware and open source guys annoying but this what they talk about.
in reply to Randahl Fink

Not just China doing this. I remember arstechnica.com/tech-policy/20…

It is generally not a good idea to give others control over apparatuses that you own.

in reply to Randahl Fink

@ArtHarg

you have plenty of this, everywhere
one of my favorite is farmers using hackers to be able to self-repair their tractors...

copperhilltech.com/blog/farmer…

in reply to Randahl Fink

What! 🤨 How would the switch destroy the bus? What's the trick?
in reply to Thierry Van Kerm

@thierry_van_kerm for instance, systems that download software updates, could potentially download a software update which deliberately contains errors.
in reply to Randahl Fink

Is this really surprising?
And, btw, don't you think the US (or Russia) don't do the same?

Time for Europeans to grow up, to stand up and get their balls unleashed from whoever hold them tight! 🙂

in reply to Randahl Fink

@thierry_van_kerm which is also a risk even if the supplier is honest. It's how the Russians destroyed a whole load of satellite kit just before Ukraine kicked off. Compromise the vendor downloads and ship firmware that physically burns the flash memory. At that point it's probably a PCB swap to restore for most users. A PCB that won't be stocked in bulk, probably uses components no longer manufactured and cannot trivially be mass manufactured again.
in reply to Randahl Fink

Here's another article about this in German:

derstandard.at/story/300000029…

in reply to Randahl Fink

with reference to some comments below, the USA is far worse on this topic. They call it intelectual property rights. Which makes you hand over all the sensor data of the John Deer plough, seeder or harvester to the USA mothership. Which is then sold to hedge funds to hedge against the price of the harvest you as a farmer have invested in and worked hard for. So your farm data is used by biljonairs to increase their wealth at the expense of the farmers doctorow.medium.com/about-thos…
in reply to Randahl Fink

The existence of a kill switch is one thing, but what's more fundamental here in the case of a bus is why on earth it has to be connected to the public internet in the first place?

It just doesn't make sense.

in reply to Randahl Fink

Peraphs not..

@randahl

We must ask ourself where this suspious comes from? I've get you a clue in the interview linked below.

This entry was edited (1 day ago)
in reply to Randahl Fink

Reminds me of Polish train manufacturer bricking their trains located close to independent repair shops.

So far, the only people suffering for this decision are the people that helped unbrick the trains in question.

hackaday.com/2023/12/14/polish…

This is not a China phenomenon but a greed one. Not to say that Chinese government doesn’t enjoy the results, just that I doubt they had to actively instruct anyone to include these kill switches.

in reply to slotos

@slotos Demanding that publicly bought hardware needs to have free software is a huge part of the solution to this massive problem.
in reply to Randahl Fink

Now I wonder which car built in the last five years is not connected to the internet and can receive commands from it.
in reply to Randahl Fink

Tl;Dr

Chinese electric buses have independent outgoing Comms that are used for navigation and OTA updates.

These updates could be designed to disable the vehicle (or they could do it by accident).

As others have noted, pretty much all electronic devices (from doorbell cams and printers to trains and combat aircraft) from all manufacturers (western and Chinese) have this issue.

Good to check and worthwhile developing processes to firewall, monitor and control this access.

in reply to Randahl Fink

European option:

"The extensive network of IVECO BUS and IVECO service points guarantees support wherever a vehicle is operating worldwide. The manufacturer employs more than 5,000 people and has five factories, located in Annonay and Rorthais in France, in Vysoké Myto in the Czech Republic, and in Brescia and Foggia, in Italy."
ivecobus.com/france/La-Marque

in reply to Randahl Fink

Sad story, Alstom Aptis was manufacturing good electrical buses in Alsace, France, but due to low demand, they cease activities in 2021.
European Union countries should give priority to EU products so that OUR companies don't close and to prevent sad surprises.

fr.wikipedia.org/wiki/Alstom_A…

in reply to Randahl Fink

Or if you "own" an F35 and the Orange Leader of Trumpistan decides it won't fly where you want it to go. Or fires it's missiles for you...
in reply to Graeme 🏴󠁧󠁢󠁳󠁣󠁴󠁿

@pa27 thats a bunch of bullshit

Here’s what can happen:
You can get cut off from software updates
You can get cut off from American made parts

But guess what - America needs the parts made in evey f35 partner nation to keep their jets flying too

The program forces everyone to play nice

in reply to Randahl Fink

Thanks for sharing this.

As much as I like tec, in spite of my decades of using it (I started as a mainframe op in the 1970s), I think we've let the horse bolt through the barn doors.

in reply to Randahl Fink

Kill switches are fantastic folks. The question is only about who controls the switch.

-- When the owner of the asset can control the kill, it is a boon for privacy, anti theft, and pro security.

-- When an adversary controls it, it is coercive, malicious, dangerous and predatory.

in reply to Randahl Fink

If google or apple can update software in my phone while I sleep I *have been hacked* 😛
in reply to Randahl Fink

A Norwegian bus company wants to know if their buses could be abused by China in the case of war.
in the mine, investigators discover a Chinese kill switch which could destroy all Chinese buses.

BOLLOX

Thank you for replicating the ridiculous accusations. A sim card and update box was found.
That system is used in thousands of buses, trains, cars, tesla for example can be switched off from usa as can john deer tractors.

in reply to Randahl Fink

Isn't this a well known practice? Isn't Tesla doing the same with OTA sw updates, performance monitoring et.c. of the vehicles they manufacture?

But, I guess, we are all conditioned to see #US #technofascism as more acceptable, for some reason.

Cassandrich reshared this.

in reply to 65dBnoise

I do not consider that acceptable at all. That is why I would never buy a Tesla.
This entry was edited (1 day ago)
in reply to 65dBnoise

I think @65dBnoise has a point. I’m pretty sure the same sort of feature is built into nearly every “smart” lightbulb and “smart TV.” The issue is not the nationality of the software developer. It’s the whole notion of being dependent on some cloud service, generally.

If the authors think war is the only reason the company would use that kill switch (or even the most likely reason) try repairing a bus with unapproved parts or trying to make unauthorised modifications to the software running on the bus. Or maybe just try not paying the bill.
@randahl

in reply to Mike Spooner

@shelldozer C’mon. Be realistic. If the Danish rep in the UN condemns the treatment of Uighurs in China, the Chinese bus manufacturer is not going to retaliate by bricking a bunch of buses in Denmark. The diplomatic fallout would be extreme.

The point is well taken that once it’s possible to brick these buses at all, it is possible to do that for a trivial reason. And what they discovered is that it is possible. But that doesn’t make it likely that they would do this for a trivial reason.

Sadly, I can’t figure out how to pass that article through a translator so I haven’t read it. When I hand it to google translate on my phone, Danish still comes out.
@65dBnoise @randahl

in reply to Randahl Fink

Thanks. I know how to do that. I’m just waiting until I am at a desktop. It’s a pain in the ass on a phone. @shelldozer @65dBnoise
in reply to Randahl Fink

wow! clever investigation, thanks for this eye opener. I'm sure it is the same here in Aotearoa

it's almost as if trading with terrorist states was a bad idea in the first place.

in reply to millennial fulcrum

@falcennial "Who would have thought buying products from evil super villains could be a problem?"

millennial fulcrum reshared this.

in reply to millennial fulcrum

@falcennial "Those imperial TIE Fighters are so well priced. Let's strike a deal with Darth Vader!"
in reply to Randahl Fink

The most thought-provoking thing about this article is that it highlights the absolutely wild level of sinophobia in scandinavia.

My wife's Volvo has remote firmware update functionality, is that a Swedish killswitch? Every one of the tens of thousands of Teslas in Denmark has remote update functionality, is that an American killswitch? Modern BMWs have remote update functionality, are those German killswitches?

I personally hate the techbroization of modern cars, and I believe that every one of these features should be regulated out of existence, but

it's amazing how this kind of stuff is accepted and normal in every part of our lives until a company based in China does it, and suddenly it's "😱 THE CHINESE GOVERNMENT HAS KILLSWITCHES IN OUR BUSSES 😱"

🙄

This entry was edited (1 day ago)
in reply to Tak!

@Tak Not wanting remote kill switches in products has nothing to do with sinophobia. I am against ALL remote kill switches from ANY country that my country could potentially go to war with.

After Donald Trump has threatened to invade Greenland, I find it deeply problematic that Danish politicians continue to use American iPhones. That does not make me anti-American. It just makes me conscious of the very real security risks Donald Trump represents.

@Tak!
in reply to Randahl Fink

I think the point is that every device that supports OTA updates has this sort of "remote kill switch". If Apple or Google wanted to disable your phone remotely, they could push out an update that did that. Same with Volvo, Tesla, Rivian, Chrysler, HP, Roomba, Sony... If it can be updated remotely, it can be disabled remotely.
This entry was edited (1 day ago)
in reply to Randahl Fink

@Tak the article doesn’t claim to have found a “remote kill switch” but rather posits that OTA updates could be used as such. Which is almost certainly true. But did the Norwegian government want a different arrangement? did they ask for the opportunity to audit OTAs and sign them for distribution to their fleet? Because big municipal buyers could almost certainly work with these companies to get these things. It’s just not a priority for most government purchasers to add complexity and would be an ongoing expense in IT infrastructure
@Tak!
in reply to Randahl Fink

@Tak Apart from the security risks, it started, I think, with greed - greed by companies who say: you may think you own that device, but no, we control it, we tell you how to use it. It's as simple as software as a service so instead of buying Word or Excel once, you have to pay for it every year. And it's how HP can decide to brick your printer if you put in any brand of ink except theirs. How software companies can force you to buy a new phone just to use basic functionality.
@Tak!
in reply to Randahl Fink

"Destroy" here means "make unusable via an OTA software update". Not any better than "destroy", of course.
This entry was edited (1 day ago)
in reply to Randahl Fink

So remove the radio modules from them. They should never have been there to begin with. Vehicles do not need "OTA updates".
in reply to Randahl Fink

Not the first time “rogue devices, including cellular radios, were discovered in Chinese-made power inverters“ m.economictimes.com/news/inter… @randahl
in reply to Randahl Fink

I read the article - they did not find an actual kill switch. They found that it could be updated remotely, to install a kill switch - not quite the same thing
in reply to Randahl Fink

others are correct saying that this seems to be common practice, but it's not good and we shouldn't just take it. We, no matter if a country or a person, should OWN what they buy, without the possibility of the seller to change that after the fact!
in reply to Randahl Fink

well, translation does not sound that scary and specific:

> " The Chinese electric bus contains a computer that, among other things, controls the bus's battery and engine, so the bus can most efficiently drive around Oslo. And this computer is – via a small sim card – on the Internet, so it can send information and sometimes retrieve an update back. For yes, a bus can be updated in exactly the same way as your phone."

TL;DR: remote tracking and updates which can be used maliciously

in reply to Randahl Fink

To be fair, my ten year old north american GM car has the same kind of remote "kill switch" vulnerability. It's there as a feature of the OnStar theft protection package that came with the car even though I'm not paying for it.

If the U.S. regime wanted to take over Canada, it could (potentially) order car companies to disable nearly every car and truck we have.
#autos #theftprotection #ElbowsUp

in reply to Randahl Fink

Sorry, unless we suddenly start to take non-elective OTA updates without safeguards such as independently reviewed, reproducible source code builds as the theoretical but very possible general threat that they are, I fail to see how this is special. Even more so because @briankrebs boosted it.

Vendor-forced OTA updates are an accepted practice. Attack the practice, not the practitioner.

in reply to Daniel Molkentin

@danimo I see your point. OTOH, this doesn't seem like one of those single-cause problems. Both things can be true and needful.
in reply to BrianKrebs

@briankrebs point taken, but the article is baity to the point of being false. They did not find a backdoor, unless all auto-OTA devices are considered backdoored (which is an assumption most of us professionals work under, but not the articles' general public audience). With a headline like this, I would expect an actual remotely triggerable reverse shell tbh.
in reply to shironeko

@shironeko @danimo i wonder if you think the US govt's pending ban on TP-Link devices is also xenophobia vs. an unacceptable threat?
in reply to BrianKrebs

of course it is, are TP-Link routers that much worse than all the other routers on the market? If the goal is security, setup a standard test for it.
in reply to shironeko

@shironeko @danimo I think the honest answer to your question is the entire industry is a race to the bottom, and comparing the relative security of devices does not offer a very wide range. That said, not all router makers, e.g., ship devices w/ years-old Linux vulnerabilities, or make major updates but use the same revision numbers etc. Or have a history of including undocumented user accounts, etc. Not saying TP-Link is guilty of all that, but the truth is most consumer-grade devices are best wiped and equipped w/ open source firmware. It's a horrible market all around.
in reply to Daniel Molkentin

@danimo I think you are missing a crucial point: Over-the-air updates is a general practices, yes, but there is a vast difference between getting over-the-air updates from allies, and getting over-the-air updates from a country which supports Russia's invasion of Europe.
@briankrebs
in reply to Randahl Fink

Honestly, with the Cloud Act and similar laws in place and tech companies obediently submitting to the Trump Administration, I don't really trust any product from the US, and I am saying this with a lot of US tech on my desk. I don't see why I should trust US products any more than I trust Chinese ones.

If it would serve his purpose, Trump would jump in Putins' lap in a heart beat and abadon Kyjiw. Right now, he's just heartbroken about his imaginary best buddy.

@briankrebs

This entry was edited (1 day ago)
in reply to Randahl Fink

I wonder how long it'll take to uncover something similar with trains built by CRRC.
in reply to Randahl Fink

china china china, tbh probably all modern cars have this.
in reply to shironeko

@shironeko very true. But that is not the point. From a security perspective, it is more likely that NATO could end up in a military conflict with China which could lead to kill switches being engaged, than for example NATO ending up in a war with Germany, and Volkswagen disables all cars in NATO countries.
in reply to shironeko

@shironeko if that was true, all iPhones would have been bricked by hackers already.
in reply to Randahl Fink

do you really think state backed hackers cannot possibly do it?
in reply to shironeko

@shironeko if it was possible, do you really believe there would not be a single news story about this happening?
in reply to Randahl Fink

To be fair: All Tesla's, and probably many other EV's on the market today have this same functionality.

It's not a "kill switch" directly, it's that the busses support OTA with full admin-rights directly from the manufacturer without user envolvement that could theoretically be used as a kill switch.

Now, if you read further on the "Lion Cage" project, that is scary shit.

in reply to Randahl Fink

Version of the story from The Guardian.

Danish authorities in rush to close security loophole in Chinese electric buses theguardian.com/world/2025/nov…

in reply to Kevin C 🎬

@kcarr2015 It is so funny for us Danes to see the politicians panicking now.

For years, Danish security experts warned about this, but most politician arrogantly rejected this as paranoia.

There was a tv-show were a politician from Venstre arrogantly said: "It is okay to fear wars and such, but one cannot fear a computer".

in reply to Randahl Fink

huawei suspected of kill switch in routers
dji drones suspected of kill switch
e-cars suspected of kill switch
vacuums suspected of mapping

WHEN DO NATIONS START DEMANDING OS SOVEREIGNTY?

(not expensive or complicated: it's called open source software and linux)

PS: the expensive and complicated part?
EDUCATING VOTERS TO VOTE FOR IT

in reply to Randahl Fink

They didn’t find a kill switch. What they found was a built-in SIM card - something that's legally required in some countries and present in most modern vehicles - and the ability to perform OTA updates, which is also standard today. And yes, any modern connected vehicle can technically be disabled through a software update if the manufacturer chooses to do so.
in reply to Randahl Fink

do busses really need to be connected to the internet?

however attractive that seems, the possibility (actuality, in this case) of remote interference makes it too costly.

same for everything else, too. does my fridge need to be? my tv?

in reply to Randahl Fink

This is important - and is true for all internet connected tech.

Something I've thought a lot of lately because of our proximity to the US and reliance on US tech - in spite of the threats of annexation coming from Trump.

Is it likely? No. Is it possible? Most certainly - and the due diligence needs to be done to make sure critical hardware and services are hardened and impervious to such an attack.

in reply to Randahl Fink

After what #israel did with mobile phones i’m surprised they are only looking at buses.
in reply to Randahl Fink

Can they do the same thing with the other bus types they have? I don't see why a Chinese government having the ability to disrupt bus traffic is different from any other foreign government having the ability to disrupt bus traffic.
in reply to Randahl Fink

I just wrote a similar article about Israel banning Chinese cars from the military...

securityboulevard.com/2025/11/…

in reply to Randahl Fink

They should check the 43% of their busses that aren't from China, too
in reply to Randahl Fink

since most tech is made in China... I imagine most devices may also have this!
in reply to Randahl Fink

Digital sovereignty and stories about people ditching the "smart-home" idea looks with new colors?
in reply to Randahl Fink

I bet f-35 has a kill switch. When USA attacks Greenland and you turn the ignition key, only the dashboard warning light comes on.
in reply to Randahl Fink

And this is why I would never, ever own a Chinese vehicle and am migrating away from all electronics made in China.
in reply to Randahl Fink

Ok I read the translated article and it seems that what they found was the computer that controls the battery and inverter had a sim card in to to allow for firmware updates.

In theory the firmware could be updated to kill the bus but I couldn't see any mention of a function in the existing firmware kill the bus.

This "update firmware to kill" vulnerablity is present in any hardware that can be updated.

Sometimes it happens inadvertently when apple/Google brick a load of phones.

in reply to Randahl Fink

And that is why being electronically independent make sense. Unfortunately not is not always possible but these tests are easy to perform by forensics. That being said, include a clause in the contract specifying remote kill switches, investigate the product you are buying and return them if you find something related.

If you are a country this should be mandatory

in reply to Randahl Fink

One wonders if *any* modem vehicle is free of such controls. Multiple systems could each have one controlled by someone else. Who holds the kill switches?
in reply to ScottMGS

@ScottMGS we clearly need a law, that EU vehicles must offer the option to ONLY update when requested by owners to do so.
in reply to Randahl Fink

@ScottMGS As 'alarmist' as the post sounds, there is reason to worry, of course - remote updates/command can be abused, and it actually does happen. I also recall the inverters used in many solar installations at one point could be accessed and shut down remotely, by the manufacturer. That definitely is a vulnerability. Shutting down all renewable power is an increasing security risk.
tomshardware.com/tech-industry…
in reply to Randahl Fink

Article says that investigators found no spying functions and no kill switch.

They "discovered" auto update function. Described scenario is of course possible (for every device with auto update function), but this is not a kill switch.

But I guess any reason is good for anti-Chineese FUD?

in reply to Randahl Fink

That sounds like madness, but I'm not surprised. After planned obsolescence, this is the logical next step in control.
in reply to Joey Provolone

@Joey Provolone @Randahl Fink I fear that it's not possible anymore - most if not all car manufacturers are now required to include certain hardware to abide car safety laws, so fully analog vehicles like the ones from the 80's or so have been gradually phased out.
in reply to Carlos Solís

@csolisr
yeah, i mean even look at appliances. its hard to find a non-smart or basic fridge without smart apps or screens built into them.
in reply to Randahl Fink

railway-technology.com/news/th…
Polish on Polish Train kill switches. Maybe this is more of anabuse of IP issue than a security/defense issue.
in reply to Randahl Fink

Literally a top security concern at every sec conference I attendeded back in the 2000s.
And people were like "Stop being paranoid"

Remote OTA updates are a compromise vector for *anything* capable of it.

in reply to Randahl Fink

So they are not different from Teslas.

Or from any other device that can get OTA updates, which allows the maker of the device to install any change any time?

Flo reshared this.

in reply to Randahl Fink

saying they "found a kill switch" is a bit alarmist IMO.

They found that over the air firmware updates are supported. Yes the manufacturer could in principle ship broken firmware, but there's no indication they built functionality specifically to disable the buses - unlike, say, European and North American car manufacturers, which build in features specifically designed for dealerships to disable a car if the buyer misses payments, sold *as a feature* to dealerships.

in reply to Randahl Fink

These kill switches are likely embedded in every chip-enabled product.

It's a national security problem. Spyware, control, & sabotage all in one.

But it's also part of a fossil fuel disinformation campaign to undermine renewable energy.

It's for accelerated planned obsolescence in household appliances, phones, computers, routers, vehicles, satellites, home heating, public lighting, electric grids, and solar & wind electricity generation.

reuters.com/sustainability/cli…

1/

in reply to Randahl Fink

wow how many other products have imbedded kill switches? The hot rumour in #Canada is the #US has put a kill switch into the #F35 that we have purchased from them.
in reply to Randahl Fink

@jpmens hmm. Everyone knows the bus has a SIM card — just like literally every car these days. Over‑the‑air updates are standard (what do they think the SIM is for?). So why on earth would anyone drive into a mine for that? I mean, it’s probably even spelled out in the bus manual
in reply to Winfried Angele 🇺🇦🇪🇺

@Winfried Angele 🇺🇦🇪🇺 @JP Mens @Randahl Fink They weren't looking for the SIM card, they were looking for *any* external communications. Every electronic device has the potential to carry a transceiver, whether for good or evil. They were going to a place guaranteed to have no other RF transmissions at all so that they could know that anything they detected came from the bus.

Afterward, having found nothing else, they examined the potential attack vectors exposed by the SIM card.

in reply to Blaise

@blaise @jpmens then the toot was misleading imo. They found nothing! This OTA "killswitch" was already known. So there is no news at all. At least no bad news.
in reply to Randahl Fink

This clicks with my support for the right-to-repair movement here in the US and elsewhere...consumers should be able to repair their purchases, replace batteries, etc. themselves or by a third party, rather than being forced to go back to the dealer or simply discard it and buy a new product.

And related to that....the ability to turn off updates or sever connections should they see fit.

in reply to Randahl Fink

Everything else aside, Librewolf's translation including the phrase "a so-called spectrum analyzer". ROFL "spectrum analyzer" as if!
in reply to Randahl Fink

Why don't they mention the manufacturer of the specific vehicle tested, by name?
in reply to Randahl Fink

Two articles in English:
- cybernews.com/security/norway-…

- aa.com.tr/en/europe/oslo-tests…

in reply to Randahl Fink

Doesn't the SIM card have to connect to a specific, paid-for network? So who is paying for the network?

If there's a way to get a working SIM card without paying, I'm very interested.

I suppose the next step is that the Chinese will require the SIM card to be in place to operate. Which means the bus will stop if you drive through a 0-bar location. And the drive won't be able to call for help because her phone will also have no connection.

in reply to Randahl Fink

I’m less worried about China putting a kill switch in my PC, phone, car and much, much more concerned about China having kill switches or back doors in our critical infrastructure like the electrical grid or water supply. Just imagine the chaos that would ensue if the electrical grid were to go down. I don’t know much about the electrical grid, how resilient it is, how likely a wide spread outage would be, or how quickly we could recover those services. What I’ve read is terrifying.
in reply to Randahl Fink

Now imagine the thousands of personal electric vehicules, with their camera, on board computer and network connection: how far are they from possibly remote controlled drones ?
in reply to Randahl Fink

Is there really any difference between a remote ‘kill switch’ and a Trojan virus?
in reply to Randahl Fink

per the article, there is no more of a kill switch than in any other electronic product that accepts updates over the internet. It is also not “Chinese” except that manufacturer is in China. In fact, the article even starts off with an example of a hypothetical US military ordering Apple to brick all Danish phones, an example which is different in no functional way than the bus scenario.
in reply to Randahl Fink

@DieWespe maybe you should have read the article? They did not find a Kill Switch. They found the ability for OTA updates.
in reply to Randahl Fink

U.S. kill switches, Chinese kill switches, Russian killers (called "soldiers") are much scarier than the complete Cold War that our parents and our generation witnessed. Coupled with the rise of neo-Nazis around the world, this makes me think that the world is preparing for the next big war.🤔
in reply to Randahl Fink

Another Snowden moment. Meaning, another time that "ordinary people" realises something that tech people have known forever but was told "no, you're just being paranoid" 🫣
in reply to Randahl Fink

Und alle träumn weiter und hoffen darauf, dass es so schlimm ja nicht kommen wird ...
in reply to Randahl Fink

This seems like an important story. Unfortunately the Zetland site doesn't allow Google Translate.

@randahl

in reply to Randahl Fink

This seems somewhat sensationalized, even if hypothetically true. An auto-update mechanism enables arbitrary code execution by the vendor, but is not a direct purpose-built kill switch.
in reply to Randahl Fink

so they found out its like any other device with OTA updates. That an update can brick it. I remember reading that VW requires their ID car to be on flat ground for OTA update because of possibilty of bricking.
in reply to Randahl Fink

@bobdvb
It is misleading though.
Not a kill switch a software update mechanism.
That doesn’t get clicks though does it
in reply to Randahl Fink

y'all: debating how serious this is and whether is constitutes malice
me: wondering how I get the "testing busses in the cave" job

we are not the same

in reply to Randahl Fink

In Sweden they downplay the risks and say they are in discussion of what or what the manufacturer is allowed to do, like if they get in a contract, the Chinese wouldn't allow the ccp to control the busses...