close

14358658_643717279136949_7111384670773605092_n  

 

今日主題:Remote Door Controls Are Car Security Flaw / 汽車遙控裝置的紕漏

洪欣老師推薦:托福聽力最好的課外教材:60-Second Science

康康精選托福會考的主題,堅持每天精聽一定會進步的哦!!

建議方法:
1.
先聽兩三遍 (不看文稿)
2.
再一句一句聽寫 (每句都要聽寫數遍,直到寫出85%以上的字)
3.
最後check文稿,看哪聽不出來,單字沒背過,還是發音不熟。
4.
堅持天天聽,就能每天進步哦。

MP3音檔 (按右鍵可下載聽):喜歡的同學,幫忙推或按讚哦~~
http://online1.tingclass.net/voaspe/2016/20160822sa_tech.mp3

只有音檔怎夠,聽不懂地方,不用怕,康康幫你準備好中英文稿了:

中英文稿:
Today's cars have loads of computer smarts built in. Like the chips that allow you, with the push of a button to unlock your car. And as new cars move down the assembly line, automakers program those functions into the car.
現在的汽車中有大量的電腦智慧系統。例如,一按按鈕,車門就開了。隨著新車從移出裝配線,汽車製作商已經在汽車內設置了這些功能。


"They produce one car and they program a cryptographic secret in it, in order to secure it against thieves." Timo Kasper, a cryptographer and engineer at the security and IT consulting company Kasper & Oswald. "Then comes the next car on the production line and they put the same secrets into the second car. And then comes the third car on the production line and they again put the same secrets into this car. And they repeat this process for millions of cars in the world. And now millions of cars in the world share the same cryptographic secret. Of course, this secret is not so well protected anymore, because it's in every of these million cars, and in every remote control. And this is of course a typical example of how to not do it."
為了避免偷竊行為,汽車製造商每生產一輛汽車,就會在車內安裝一個密碼系統。Timo Kasper是安全諮詢公司Kasper & Oswald的一名譯解密碼者,同時也是一名工程師。在生產下一輛車的時候,他們在另外一輛車上,裝上了同樣的密碼系統,然後是第三輛車,他們又裝上了同樣的密碼系統。對於世界上數百輛車,他們都重複著同樣的過程。現在,世界上數百萬輛車擁有同樣的密碼。當然,現在人們沒有保守好這個密碼系統,因為,在數百萬輛車中,在每個遙控裝置中都存在這樣的密碼系統。這成為了一個應該避免的典型的例子。


And yet, he says that's exactly how the Volkswagen Group did do it, for many cars manufactured in the last 20 years. Kasper and his colleagues decoded that shared cryptographic secret by studying the design and operation of chips from VW Group cars and remotes. After hacking the hardware, they were easily able to eavesdrop on and decrypt unlocking signals, clone the remote control and unlock cars. They presented the details August 12th at the USENIX Security Symposium, in Austin, Texas.
Timo Kasper
表示福斯汽車就在對過去20年生產的汽車進行上述操作。Kasper和同事們通過研究福斯汽車和其遙控裝置的晶片,解碼了共用的密碼系統。在入侵硬體之後,他們很容易能夠竊聽和解密釋放信號克隆遙控器解鎖汽車。812日,在德克薩斯州AustinUSENIX安全研討會上,他們公佈了具體的資訊。


Kasper says VW is aware of the problem—and they're not alone. "This is not a VW bug but this is a red line, as we Germans say, through all the automotive industry." In fact, in the same study, they showed that another encryption system used by many other brands, including Ford, Chevy, Nissan and Mitsubishi, has a weak cryptographic algorithm—which, again, allowed the team to break into more than a dozen cars.
Kasper
表示福斯已經意識到了這個問題——同是,並不只是福斯。這不是福斯的漏洞,就如我們德國人描述的那樣這是一個危險警戒,是汽車行業的一個危險警戒。實際上,在同樣的研究中,他們呈現了,其他品牌,如福特、雪弗蘭、尼桑、三菱等使用的另外一種加密系統。這種系統使用的加密演算法也有紕漏,這導致團隊再一次成功解鎖了數十輛汽車。


Bottom line? It's easier to hack into cars than many drivers might have imagined. So if you want to avoid eavesdropping, the researchers recommend simply ditching remote controls and cryptography, and just go back to the good old metal key.
結果呢?與許多駕駛者想像相比,入侵解鎖汽車似乎更加簡單。如果你想避免被竊聽的話,研究人員建議,很簡單,那就是不使用遙控和加密裝置,而重新使用傳統的金屬鑰匙。

arrow
arrow

    字神帝國英語天地 發表在 痞客邦 留言(0) 人氣()