I can’t. I just can’t.

  • acosmichippo@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    arrow-down
    7
    ·
    edit-2
    15 hours ago

    the “surveillance” seems to happen on the car locally. Kind of an expansion of current driver attention systems to include impairment detection.

    • XLE@piefed.social
      link
      fedilink
      English
      arrow-up
      65
      ·
      15 hours ago

      “Local” surveillance happening on the same car computer that’s attached to a SIM card.

      Yeah seems safe

      • FauxLiving@lemmy.world
        link
        fedilink
        English
        arrow-up
        36
        ·
        13 hours ago

        It’s local right until the law enforcement gets into Bluetooth range with the right encryption keys to download all of the data for the past year.

          • tal@lemmy.today
            link
            fedilink
            English
            arrow-up
            8
            ·
            10 hours ago

            I remember when we discovered that militants in Afghanistan were monitoring Predator video feeds because apparently nobody had ever put in a requirement that the video stream be encrypted.

            https://www.networkworld.com/article/769321/insurgents-intercept-video-feeds-from-u-s-drones-using-26-software-report-says.html

            Militants in Iraq and Afghanistan have intercepted live video feeds from unmanned U.S. Predator drones using $26 off the shelf software made by a Russian company, says a report in the Wall Street Journal.

            • elephantium@lemmy.world
              link
              fedilink
              English
              arrow-up
              3
              ·
              8 hours ago

              IIRC that was because the Predator video feeds were intended to be viewed in-theatre by officers right there on the front, and military protocol around encryption keys would have made it so no one at the front would have been able to decrypt the feed.

              Considering they were designed in the early 90s, i.e. before public-key cryptography took off with SSL, that explanation always seemed plausible to me.