For Jeep to implement what? The vehicle does not communicate over the internet. It talks only to the SiriusXM servers using the AT&T cellular network. It cannot be directly accessed or controlled from the internet.Just added a poll. Should appear above. I expect this will demonstrate that there isn't enough demand for Jeep to implement this.
You correctly point out one of the many misunderstandings throughout this thread. It's just FUD, and how people operate.For Jeep to implement what? The vehicle does not communicate over the internet. It talks only to the SiriusXM servers using the AT&T cellular network. It cannot be directly accessed or controlled from the internet.
Exactly. It's not connected to "the web". Still requires some sort of hands-on access.For Jeep to implement what? The vehicle does not communicate over the internet. It talks only to the SiriusXM servers using the AT&T cellular network. It cannot be directly accessed or controlled from the internet.
But they are never really "online". It's not the web or internet. It's end-to-end.I'm talking about an on/off switch. Not a permanent "never going back online forever" switch.
It absolutely is encrypted. Also, the connection from AT&T to the servers is *probably* over private networks. That's how most machine to machine (M2M) cellular networking is done. There would be no reason to do otherwise. Your vehicle ID is also anonymized and just a number. So the potential "internet" attack surface is the Guardian servers, and they'd have to figure out a way to address your specific vehicle, and then all they could do is the basic things that are allowed. There's no conceivable attack such as "turn off the brakes."I am curious - maybe someone here knows - isn't it possible that said communication between JT and those servers could be done via VPN? Encrypted tunnel........If that were the case, good luck getting into that stream.
If you are a technical person with experience in how these types of fleet control applications typically work than YES, you can (with a reasonable degree of accuracy) ...If you haven't audited the network it's impossible to say exactly how it does and does not work from one end to the other in every situation. Admittedly it would have been better for me to specify "with wireless transmissions" instead of "over the internet".
That was my assumption - not too far from the networks I set up and the private isolated network we had at work between the mainframe areas that had info from SSA to the server on our end that handled the client app that used said info.It absolutely is encrypted. Also, the connection from AT&T to the servers is *probably* over private networks. That's how most machine to machine (M2M) cellular networking is done. There would be no reason to do otherwise. Your vehicle ID is also anonymized and just a number. So the potential "internet" attack surface is the Guardian servers, and they'd have to figure out a way to address your specific vehicle, and then all they could do is the basic things that are allowed. There's no conceivable attack such as "turn off the brakes."
In some neighborhoods you should be more concerned about someone stripping the thing bare, removing wheels, doors, etc. (or entire differentials)Good lord. What’s the worst that can happen someone opens your doors or remote starts your vehicle? This isn’t a Tesla. Think we’re getting overly paranoid here. Someone can hack your phone, computer, etc... it’s the price you pay for technology. It’s always out there as a potential.
Dude, we're on like the third 20-page thread about the key fob size too. Gladiators are so perfect, people have to invent reasons to whine.Good lord. What’s the worst that can happen someone opens your doors or remote starts your vehicle? This isn’t a Tesla. Think we’re getting overly paranoid here. Someone can hack your phone, computer, etc... it’s the price you pay for technology. It’s always out there as a potential.