Daniel Lange and Felix "tmbinc" Domke bought some of Volkswagen's cheating Engine Control Units on Ebay and extracted and decompiled the software in them to learn exactly how the cheating took place.
Their presentation at the thirty-second Chaos Communications Congress presents their findings, which include a detailed analysis of the software trickery used to detect when the car was being tested by a regulator to change the car's emissions characteristics.
They also reveal that they've discovered other cars that use VW's techniques to cheat on tests.
The exhaust emissions scandal („Dieselgate“)
Take a deep breath into pollution trickery [Daniel Lange (DLange) and Felix "tmbinc" Domke/CCC]
California Assembly member Miguel Santiago [D-83/@SantiagoAD53] is the chairman of the Communications and Conveyance Committee, where he is single-handedly sabotaging the state's outstanding proposed Net Neutrality bill.
Alejandro Chavez Zavala was running for mayor of Tareta in the state of Michoacan when he was gunned down following a campaign event.
Defense contractors are making millions off the Trump administration’s racist campaign to separate immigrant kids from their parents, and detain the kids separately –indefinitely– in ad-hoc camps. We already know Trump and his allies in government are amoral. We need to hold accountable these private sector enablers, too.
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]
Your pet might be photogenic, but getting them to stare long enough at your camera to snap that Instagram-worthy photo isn’t as simple as telling them to sit. Bribing your pets with their favorite treat, however, might just do the trick, and with the Adjustable Pet Selfie Smartphone Attachment, you can do just that while getting […]
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]