Event JSON
{
"id": "55074b9d890aa24fc6530fb746d4f4ea3f5d3262d785d1a2a0f5b2dd6f910f39",
"pubkey": "8b3ae84611fb7ec69188daf33cf270daa862f96f240e3765f7f0db6eb7dc6711",
"created_at": 1727354865,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@agreenberg/113203928462573760",
"web"
],
[
"proxy",
"https://infosec.exchange/users/agreenberg/statuses/113203928462573760",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/agreenberg/statuses/113203928462573760",
"pink.momostr"
],
[
"-"
]
],
"content": "Hackers showed me (there's video) how a website vulnerability let them locate, unlock, honk the horn, start ignition of any of millions Kias in seconds, just by reading a car's license plate.\n\nThey found similar bugs for a dozen carmakers over the last two years.\n\nhttps://www.wired.com/story/kia-web-vulnerability-vehicle-hack-track/",
"sig": "76e34e9fe6e3ca492f89bfef122a03575463a902e8f3ea6dbb0da9daca75d3c29e588e5726b6cc3115acce9fc95e7d2302163592c81d0cd943f1fe646f176785"
}