Did Tesla Break into Cars? or – Are We Witnessing a Decline in Private Ownership?

Jason Hughes is a white hat hacker – a ‘good’ hacker, working diligently to discover and identify ways in which existing systems can be hacked into. During one of his most recent forays, as described in TeslaRati he analyzed a “series of alphanumeric characters found embedded within Tesla’s most recent firmware 7.1”. According to Hughes, the update included the badges for the upcoming new Tesla model, the P100D. Hughes tweeted about this development to Tesla and to the public, and went happily to sleep.

And then things got weird.

According to Hughes, Tesla has attempted to access his car’s computer and significantly downgrade the firmware, assumedly in order to delete the information about the new model. Hughes managed to stop the incursion in the nick of time, and tweeted angrily about the event. Elon Musk, CEO of Tesla, tweeted back that he had nothing to do with it, and seemingly that’s the end of the story. Hughes is now cool with Musk, and everybody is happy again.

tesla tweet 2

But what can this incident tell us about the future of private ownership?

 

A Decline in Private Ownership?

One of Paul Saffo’s rules for effective forecasting is to “embrace the things that don’t fit”. Curious stories and anecdotes from the present can give us clues about the shape of the future. The above story seems to be a rather important clue about the shape of things to come, and about a future where personal ownership of any networked device conflict with the interests of the original manufacturer.

Tesla may or may not have a legal justification to alter the firmware installed in Hughes’ car. If you want to be generous, you can even assume that the system asked Hughes for permission to ‘update’ (actually downgrade) his firmware. Hughes was tech-savvy enough to understand the full meaning of such an update. But how many of us are in possession of such knowledge? In effect, and if Hughes is telling the truth, it turns out that Tesla attempted to alter Hughes’ car properties and functions to prevent damages to the company itself.

Of course, this is not the first incident of the kind. Seven years ago, Amazon has chosen to reach remotely into many Kindle devices held and owned by private citizens, and to delete some digital books in those devices. The books that were deleted? In a bizarre twist of fate they’re George Orwell’s books – 1984 and Animal Farm – with the first book describing a dystopian society in which the citizen has almost no power over his life. In 1984, the government has all the power. In 2016, it’s starting to seem that much of this power belongs to the big IT companies that can remotely reprogram the devices they sell us.

20090717-t3722tnq7c2dqs2sk459g7mgdn.jpg
Image originally from Engadget.

 

The Legal Side

I’m not saying that remote updates are bad for you. On the contrary: remote updates and upgrades of system are one of the reasons for the increasing rate of technological progress. Because of virtual upgrades, smartphones, computers and even cars no longer need to be brought physically to service stations to be upgraded. However, these two episodes are a good reminder for us that by giving the IT companies leeway into our devices, we are opening ourselves to their needs – which may not always be in parallel with our own.

I have not been able to find any legal analysis of Hughes’ and Tesla’s case, but I suspect if the case is ever being brought to court then Tesla might have to answer some difficult questions. The most important question would probably be whether the company even bothered to ask Hughes for permission to make a change in his property. If Tesla did not even do that, let them be penalized harshly, to prevent other companies from following in their footsteps.

Obviously, this is not a trend yet. I can’t just take two separate cases and cluster them together. However, the mechanism behind both incidents is virtually the same: because of the everpresent connectivity, the original manufacturers retain some control over the devices owned by end-users. Connectivity is just going to proliferate in the near future, and therefore we should keep a watchful eye for similar cases.

 

Conclusions

This is a new ground we’re travelling and testing. Never before could upgrades to physical user-owned devices be implemented so easily, to the benefit of most users – but possibly also for the detriment of some. We need to draw clear rules for how firms can access our devices and under what pretense. These rules, restrictions and laws will become clearer as we move into the future, and it’s up for the public to keep close scrutiny on lawmakers and make sure that the industry does not take over the private ownership of end-user devices.

Oh, and Microsoft? Please stop repeatedly asking me to upgrade to Windows 10. For the 74th time, I still don’t want to. And yes, I counted. Get the hint, won’t ya?

 

Can We Defend Our Culture From Terrorist Attacks? Yes, by Virtualizing It

I gave a lecture in front of the Jewish Alliance of Greater Rhode Island, which is a lot like the Justice League, but Jewish. I was telling them about all the ways in which the world is becoming a better place, and all the reasons for these trends to go on into the future. There are plenty of reasons for optimism: more people are literate than ever before; the number of people suffering from extreme poverty is rapidly declining and is about to fall below 10% for the first time ever in human history; and the exponential progress in solar energy could ensure that decontamination and desalination devices could operate everywhere, overcoming the water crisis that many believe looms ahead.

After the lecture was done I opened the stage for questions. The first one was short and to the point: “What about terrorists?”

It does look like nowadays, following the attacks on Paris, terrorists are on everybody’s mind. However, it must be said that while attacks against civilians are deplorable, terrorists have generally had very little success with those. The September 11 Attacks carried the worst death toll of all terrorist attacks in recent history, in which just 19 plane hijackers killed 2,977 people. While terrorism may yet progress to using chemical and biological warfare, so far it is relatively harmless when you only calculate the cost in lives, and mostly affects the morale of the people.

I would say the question that’s really bothering people is whether terrorists can eventually deal a debilitating deathblow to Western culture, or at the very least create a disturbance severe enough to make that culture go into rapid decline. And that raises an interesting question: can we find a way to conserve our culture, our values and our monuments for good?

I believe we have already found a way to do that, and Wikipedia is a shining example.

 

Creative Destruction and Wikipedia

Spot the Dog is a series of children’s books about the adventures of Spot (the dog). In July 3, 2012, the Wikipedia entry for Spot the Dog was changed to acknowledge that the author of the series was, in fact, no other than Ernest Hemingway under the pseudonym Eric Hill. In the revised Wikipedia entry the readers learned about “Spot, a young golden retriever who struggles with alcoholism and a shattered sense of masculinity.”

Needless to say, this was a hoax. Spot is obviously a St. Bernard puppy, and not a “young golden retriever”.

 

spotthedogwikibombupdate.png

 

 

What’s interesting is that within ten minutes of the hoax’ perpetration, it was removed and the original article was published as if nothing wrong had ever happened. That is not surprising to us, since we’ve gotten used to the fact that Wikipedia keeps backups of every article and of every revision ever made to it. If something goes wrong – the editors just pull up the latest version before the incident.

A system of this kind can only exist in the virtual world, because of a unique phenomenon: due to the exponential growth in computing capabilities and data storage, bits now cost less than atoms. The cost for keeping a virtual copy of every book ever written is vastly lower than keeping such copies on paper in the ‘real’ world – i.e. our physical reality.

The result is that Wikipedia is invulnerable to destruction and virtual terrorism as long as there are people who care enough to restore it to its previous state, and that the data can be distributed easily between people and computers instead of remaining in one centralized data-bank. The virtualization and distribution of the data has essentially immortalized it.

Can we immortalize objects in the physical world as well?

 

Immortalization via Virtualization

In February 27, 2015, Islamic State militants brought sledgehammers into the Mosul museum, and have carefully and thoroughly shattered an unknown number of ancient statues and artefacts from the Assyrian era. In effect, the terrorists have committed a crime of cultural murder. It is probable that several of the artefacts destroyed in this manner have no virtual representation yet, and are thus gone forever. They are, in a very real sense of the word, dead.

52aff8f727bbc1fafc1c52fa3e78d026 (1).jpeg
An Islamic State militant destroying an ancient statue inside the Mosul Museum in Nineveh. Source: AFP

 

Preventing such a tragedy from ever occurring again is entirely within our capabilities. We simply need to obtain high-resolution scans of every artefact in every museum. Such a venture would certainly come at a steep cost – quite possibly more than a billion dollars – but is that such a high price to pay for immortalizing the past?

These kinds of ventures have already begun sprouting up around the world. The Smithsonian is scanning artefacts and even entire prehistoric caves, and are distributing those scans among history enthusiasts around the world. What better way to ensure that these creations will last forever? Similarly, Google is adding hundreds of 3D models of art pieces to its Google Art Project Initiative. That’s a very good start to a longer-term process, and if things keep making progress this way, we will probably immortalize most of the world’s artefacts within a decade, and major architectural monuments will follow soon after. Indeed, one could well say that Google’s Street View project is preserving our cities for eternity.

(If you want to see the immortal model of an ancient art piece, just click on the next link – )

https://sketchfab.com/models/ad88abf5596f46ab90c5dc4eb23f8a8e/embed

Architecture and history, then, are rapidly gaining invulnerability. The terrorists of the present have a ‘grace period’ to destroy some more pieces of art, but as go forward into the future, most of that art will be preserved in the virtual world, to be viewed by all – and also to be recreated as needed.

So we’ll save (pun fully intended) our history and culture, but what about ourselves? Can we create virtual manifestations of our human selves in the digital world?

That might actually be possible in the foreseeable future.

 

Eternime – The Eternal Me

Eternime is just one of several highly ambitious companies and projects who try to create a virtual manifestation of an individual: you, me, or anybody else. The entrepreneurs behind this start-up have leaped into fame in 2014 when they announced their plans to create intelligent avatars for every person. By going over the abundance of information we’re leaving in our social networks, and by receiving as input answers to many different questions about a certain individual’s life, those avatars would be able to answer questions just as if they were that same individual.

 

 

Efforts for the virtualization of the self are also taking place in the academy, as was demonstrated in a new initiative: New Dimensions in Testimony, opened in the University of South California and led by Bill Swartout, David Traum, and Paul Debevec. In the project, interviews with holocaust survivors are recorded and separated into hundreds of different answers, which the avatar then provides when asked.

I think the creators of both projects will agree that they are still in very early phases, and that nobody will mistake the avatars for accurate recreations of the original individuals they were based on. However, as they say, “It’s a good start”. As data storage, computing capabilities and recording devices continue to grow exponentially, we can expect more and more virtualization of individuals to take place, so that their memories and even personalities are kept online for a very long time. If we take care to distribute these virtual personalities around the world, they will be virtually immune to almost all terrorism acts, except for the largest ones possible.

 

Conclusion

In recent decades we’ve started creating virtual manifestations of information, objects and even human beings, and distributed them throughout the world. Highly distributed virtual elements are exceedingly difficult to destroy or corrupt, as long as there’s a community that acknowledges their worth, and thus can be conserved for an extremely long time. While the original physical objects are extremely vulnerable to terrorist attacks, their virtual manifestations are generally immune to any wrongdoing.

So what should we do to protect our culture from terrorism? Virtualize it all. 3D Scan every monument and every statue, every delicate porcelain cup and every ancient book in high resolution, and upload it all to the internet, where it can be shared freely between the people of the world. The physical monuments can and will be destroyed at some point in the future. The virtual ones will carry on.