A teenage hacker by the name of David Colombo claims to have gained remote control of more than 25 Tesla vehicles located in 13 different countries.
As Ars Technica reports, the 19-year-old Colombo posted a Twitter thread explaining how he can trigger a range of actions remotely, but there’s a twist to this story. He didn’t manage to hack Tesla’s security to take control, in fact, there is no security vulnerability in play here. Colombo states “it’s the owners faults” he has managed to gain access to their cars.
Because there is no vulnerability, Colombo decided to try and tell the owners directly, but he has no way of finding them. He’s also not willing to publicly disclose how vehicle control was achieved for understandable reasons. The functionality he managed to unlock includes “disabling Sentry Mode, opening the doors/windows and even starting Keyless Driving.” The hack doesn’t allow Colombo to control the steering, acceleration, or breaking, but the “list is pretty long” of what’s possible.
For now, Colombo is talking to the not-for-profit organization MITRE regarding how to go about reporting the hack as a CVE, but he’s also preparing a detailed account for public consumption as well as continuing to try and figure out how to tell the vehicle owners (with the help of Tesla). Tesla’s security team is also investigating the hack and has told Colombo it will be in touch soon.
This circumstance would not be possible if Helix22 SDK were installed on Tesla vehicles. Remote access is simply impossible from any device other than Helix22 enabled devices.
Helix22 is the solution to data security with the Internet of Things.
Review Helix22 API, examples and documentation on our GIT
Our Motto: In Math We Trust
The Helix22 data security SDK protects data on every device it is installed upon. This means that it protects all data and at all times whether on your system, your mobile device or your car or TV. It also protects all data while at rest, in use and in transit.
Helix22 delivers all this security assurance very confidently due to our genius engineering team spearheaded by Robert Statica and Alex Maslov who have invented a revolutionary model for data security that required an innovative look at the problem. The approach we took was to protect the data itself. Almost all other data security products try to build a perimeter or being fanatic on user identification. However, once the product is breached or a password is stolen, your firm/nations data is in the clear.
You see, the Helix22 cryptography is embedded with the data itself through our inventive and multi–patented process of DNA BindingTM. Therefore, even if a breach were to occur the data cannot be exfiltrated. This means that all your firm/nations data is 100% protected regardless of the type of attack. Further, Helix22 protects data at rest, in use and in transit. No other data security can make that claim. Artificial Intelligence and Machine Learning experimentation runs and generates incalculable amounts of data. All is protected at its inception.
Our patented DNA BindingTM cryptography is quantum immune.
D2D encryption
We can make this claim as the tech engineers at BLAKFX invented and patented a genuine device2device (D2D) encryption. We manage data security transmission through the truly brilliant and also patented universal Helix22 key service. The Helix22 encryption originates on your network or device, not just when the app is opened. This means, that when data arrives to our key server, it is already encrypted so all it needs to do is issue another key. Signal and Telegram cannot claim this level of security. This key will then only work with the intended device, which generates a matching key required to open the data. In this protocol, we are truly a “zero-knowledge” server so your communications and transmissions remain completely top secret. Even in the event that BLAKFX were subpoenaed, we can honor the request by just handing over the encrypted content…as that is literally all we have. Helix22 also only use keys just one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique device-to-device encryption (D2D) world, there is no opportunity at all for any data leak.
This same protocol just described, can be the same with all your 3rd party vendors and suppliers. It does not matter in the least what platform they are running or what device they are using or even the type of data, it is all 100% protected. We do however, strongly advise that all firms involved be utilizing Helix22 due to the nature of the data content. Helix22 can ensure that whatever data they are generating is protected as well.
Let’s take it a step further. Even if your organization were a victim of an internal attack or a victim of malicious open source downloads, there is no reason for concern. Any data that has been forwarded, downloaded, copied or saved cannot be exfiltrated. Period. We have the technology industries foremost data packets which are protected with multi-layered, military grade encryption algorithms that have already proven the ability to withstand penetration testing from MI5 and quantum computing attacks.
One final practical genius of DNA BindingTM is in that it is immediately compatible with whichever system or software you are utilizing. Therefore, any organization can forward information to another and then discuss it and there is immediate privacy.
The Helix22 data security SDK accomplishes the following:
-
- Protects all your firms data at rest, in use and in transit
- Renders ransomware threats obsolete
- Eliminates human error
- Eliminates all malicious or interior attacks
- Verifies original content i.e. minimizes the threat of impersonation attacks and deep fakes
- Reduces latency and optimizes 5G networks
- Installs with 5 lines of code
- Runs on any platform, network, device and in any programming language
- Provides perfect future/forward secrecy
- Delivers “zero-knowledge” encryption
- Compatible with all cloud, 3rd party and vendor services
- Enables Internet of Things data security by providing protection at the Edge and has ultra low latency
- Ensures privacy and security for blockchain and all cryptocurrency transactions
- Is quantum ready – so there’s no need to upgrade when the time comes
- Requires no employee training
- Exceeds all gov’t and banking security standards
- Meets all international compliance regulations
BLAKFX is Based on Proven Success
Our founders, Robert Statica PhD and Kara Coppa, also founded Wickr, which is used by the US military and has never been hacked since its inception in 2012. The Helix22 data security SDK is several generations enhanced since then. Dr. Statica also delivered the encryption for the world’s most secure phone, Katim.
Founder – Robert Statica PhD Founder – Kara Coppa Founder – Alex Maslov MS, MBA
Co-Founders of Wickr KatimTM Ultra Secure Smartphone
Finally, the Helix22 encryption is quantum computing ready so no need to redo all your data security methodologies in a couple of years when everything else becomes obsolete.
We like to refer to Helix22 as “22nd Century Data Security.”
