Hacker News new | past | comments | ask | show | jobs | submit login

Busting through NAT is really easy... The car could just ping home and open the tunnel by itself when it sees the appropriate signal.



The whole thread doesn't hold water. It was just a mix of plausible, implausible, jargon and some profanity for relatability.

Full quote:

> model s and x use openvpn to talk to their backend. inside that backend there are metadata services that feed info to the system, one of those things being a ~20MB+ (generated by the worst erp system) json payload that describes supercharger shit for the map in the touchscreen. somebody was smart enough to do automated linting but forgot to validate against the custom parser the car runs which caused a segfault in the qt app that runs the ui, which in turn for a variety of reasons forces a reboot of that component. I think we clocked about 15 seconds before it read the file and faulted after boot. it was doing that for an hour before everyone panicked and got me and qa on the phone to fix it. i wrote a quick python/fabric script that ssh’d to as many cars as possible at a time to rm the file


Another interesting quote from this thread:

- "On that note, China has a law in place that mandates all electric cars send real time telemetry to their government servers - Model S/X/3, NIO cars and any other electric car if they're driving already complies with that law to be road certified"

- "Don't be surprised if that becomes a mandate in other countries"




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: