this post was submitted on 24 Apr 2026
579 points (97.9% liked)

Technology

84103 readers
3273 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

I can't. I just can't.

you are viewing a single comment's thread
view the rest of the comments
[–] doc@sopuli.xyz 134 points 22 hours ago (3 children)

And when all the used cars are gone and I'm forced to buy one of these I'll promptly be destroying the radio transmitters and everything related to this surveillance.

[–] AstralPath@lemmy.ca 97 points 22 hours ago (1 children)
[–] LuminousLuddite@lemmy.world 28 points 19 hours ago (1 children)
[–] X@piefed.world 11 points 13 hours ago

Do not pass go. Do not collect 200 local currency units.

[–] acosmichippo@lemmy.world 8 points 22 hours ago* (last edited 22 hours ago) (1 children)

the "surveillance" seems to happen on the car locally. Kind of an expansion of current driver attention systems to include impairment detection.

[–] XLE@piefed.social 72 points 22 hours ago (1 children)

"Local" surveillance happening on the same car computer that's attached to a SIM card.

Yeah seems safe

[–] FauxLiving@lemmy.world 40 points 20 hours ago (1 children)

It's local right until the law enforcement gets into Bluetooth range with the right encryption keys to download all of the data for the past year.

[–] plz1@lemmy.world 49 points 19 hours ago (1 children)

Bold of you to assume any of this will be encrypted.

[–] tal@lemmy.today 12 points 17 hours ago (1 children)

I remember when we discovered that militants in Afghanistan were monitoring Predator video feeds because apparently nobody had ever put in a requirement that the video stream be encrypted.

https://www.networkworld.com/article/769321/insurgents-intercept-video-feeds-from-u-s-drones-using-26-software-report-says.html

Militants in Iraq and Afghanistan have intercepted live video feeds from unmanned U.S. Predator drones using $26 off the shelf software made by a Russian company, says a report in the Wall Street Journal.

[–] elephantium@lemmy.world 4 points 15 hours ago

IIRC that was because the Predator video feeds were intended to be viewed in-theatre by officers right there on the front, and military protocol around encryption keys would have made it so no one at the front would have been able to decrypt the feed.

Considering they were designed in the early 90s, i.e. before public-key cryptography took off with SSL, that explanation always seemed plausible to me.