The cars use a closed network, but still can get hacked. The leak would allow thieves to unlock the doors, read emails, track locations and access collected data without leaving any trace.
The cars use a closed network, but still can get hacked. The leak would allow thieves to unlock the doors, read emails, track locations and access collected data without leaving any trace.