190
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 02 Nov 2023
190 points (96.6% liked)
Electric Vehicles
3214 readers
100 users here now
A community for the sharing of links, news, and discussion related to Electric Vehicles.
Rules
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- Be respectful, especially when disagreeing. Everyone should feel welcome here.
- No self-promotion
- No irrelevant content. All posts must be relevant and related to plug-in electric vehicles — BEVs or PHEVs.
- No trolling
- Policy, not politics. Submissions and comments about effective policymaking are allowed and encouraged in the community, however conversations and submissions about parties, politicians, and those devolving into general tribalism will be removed.
founded 1 year ago
MODERATORS
You asked how it can be abused. This is one way it can be abused.
If it's computer, it can be hacked. Doesn't have to be the car company itself that does the spying, though considering the track record of American companies, it wouldn't surprise me. It could be you local police department, your distrustful partner, etc...
“This is one way it can be abused”
And what is this exactly? You never provided a valid example of anything…
Then I would suggest you to re-read the article and spend a minute to think about how that relates to how the technology can be abused. I'm not sure I can make it more obvious, and honestly if feels like you don't understand it in bad faith.
Again, hearsay is not proof of anything my guy, so you've not provided anything that proves your hypothetical abuse.
You asked how it can be done