Logo
    Search

    Podcast Summary

    • Battle between John Deere and hackers takes unexpected turn in UkraineRussian troops attempted to use stolen agricultural equipment, but were met with remote disabling by John Deere, highlighting the intensity of the battle and potential consequences for unintended victims, Ukrainian farmers.

      The ongoing battle between John Deere and hackers over tractor technology took an unexpected turn when Russian troops attempted to steal and use stolen agricultural equipment in Melitopol, Ukraine. However, they were met with a surprise when they discovered the equipment had been remotely disabled by the manufacturer. This situation highlights the intensity of the battle between John Deere and hackers, and the potential consequences of this conflict. Moreover, it showcases how Ukrainian farmers have become the unintended victims of this situation, both in the short term due to the theft of their equipment, and in the long term due to the broader implications of this technological conflict. It's a strange and intriguing story with a seemingly satisfying ending, but it also serves as a reminder of the potential risks and unintended consequences of technological advances and the conflicts that arise from them.

    • John Deere's control over farmers' equipmentJohn Deere argues they license technology, not sell devices, allowing them to limit or 'brick' equipment, impacting farmers in the agricultural industry.

      The control and ownership of technology, particularly in the agricultural industry, can be a complex issue. This was highlighted in the discussion about John Deere's efforts to limit farmers' ability to use and modify their own equipment through software and licensing agreements. While consumers may believe they own the devices they purchase, manufacturers like John Deere argue they are licensing the technology and have the power to limit or even "brick" the equipment if certain conditions are not met. This can have significant implications for farmers, particularly in the agricultural industry where John Deere equipment plays a large role in food production. The debate over ownership and control of technology also raises questions about the role of hackers and app stores in the tech ecosystem and the ongoing push and pull between manufacturers and consumers. Ultimately, it's a reminder that the lines between ownership and licensing can be blurred in the tech world, and the consequences of these decisions can have far-reaching impacts.

    • John Deere's DRM in Agricultural Equipment Fuels a Black Market for HackingJohn Deere's DRM system in agricultural equipment restricts farmers and mechanics from repairing their own tractors, leading to a thriving black market for hacking, including modifications to tractor speeds and access to technician tools, mirroring trends in the SaaS model.

      John Deere's implementation of digital rights management (DRM) in their agricultural equipment has led to an unexpected consequence: a thriving black market for software hacking. This DRM system restricts farmers and mechanics from repairing their own tractors without John Deere's authorization, leading to significant delays and costs. The need for this unauthorized software has grown beyond just repair licensing, with hacks being developed to modify tractor speeds and access technician tools. This situation mirrors the trend in software as a service (SaaS) model, where instead of owning a product outright, users pay ongoing subscription fees. The agricultural tech hacking ecosystem is a foreboding sign of where we might be headed as a society, as more and more industries move towards this model. It's important to consider the potential unintended consequences of such restrictions and the role of hackers in pushing back against them.

    • John Deere's tractor licensing agreement and the trend towards membership modelsJohn Deere's tractor licensing agreement restricts modifications and requires customers to use only their equipment, potentially limiting consumer choice and control in the agriculture industry, reminiscent of registered software licenses in other industries.

      As society continues to grapple with income inequality, we may see a shift towards membership licensing models for major purchases, including farm equipment. John Deere's efforts to restrict modifications to their tractors through licensing agreements is a prime example of this trend. While the Digital Millennium Copyright Act allows for software modifications on land vehicles for diagnostic, repair, and lawful purposes, John Deere's contract requires customers to use only their equipment and waive their rights under the Act. This means that if you want to buy a tractor from John Deere, you must agree to these terms. The implications for used tractors and resale conditions are unclear. This trend towards licensing models also brings to mind the use of registered software licenses in other industries, such as audio equipment. While the specifics of VIN locking and its history in the luxury vehicle market are interesting, the larger issue is the potential for these licensing agreements to limit consumer choice and control.

    • VIN system's expansion to agriculture tech raises privacy concernsManufacturers argue for data protection, while critics claim it's a monopoly tactic. Consumers need accurate info to make informed decisions.

      The vehicle identification number (VIN) system, which originated in the auto industry, has expanded to various sectors including agriculture technology. This system is used to ensure authorized access to repair software and data, often raising concerns around privacy and right to repair legislation. Manufacturers argue that preserving their repair monopolies is necessary to protect valuable data produced by these machines, which can be used to improve efficiency and productivity. However, critics argue that these arguments are often used to scare consumers and maintain a monopoly. For instance, the fear of stalkers accessing personal data is an exaggerated concern. In reality, personal information in cars can be deleted before selling to ensure privacy. The debate around right to repair laws is complex, with manufacturers arguing for the need to protect valuable data and consumers advocating for the right to repair their own devices. Ultimately, it's important for consumers to be informed and make informed decisions based on accurate information.

    • John Deere's Control Over Agricultural Machinery DataJohn Deere's control over data from agricultural machinery raises privacy, ownership, and security concerns. Farmers may not have access to valuable data, and must either hack the system or purchase it back from John Deere.

      John Deere's control over the data and functionality of their agricultural machinery raises significant concerns around privacy, ownership, and security. Farmers who rely on these tractors and combines to manage their crops may not have access to valuable data produced by the machines, such as soil moisture levels or planting schedules. Instead, they must either hack the system or purchase the data back from John Deere, sometimes as part of a bundle with Monsanto seeds. John Deere argues that this level of control is necessary for security reasons, but it has led to a thriving ecosystem of tractor hackers. The situation presents a real risk, revealing the potential consequences of overly restrictive technology. It's a complex issue with implications for food security, privacy, and innovation.

    • John Deere's Farming Equipment Security TestedSecurity researcher found vulnerabilities in John Deere's farming equipment, potentially compromising food supply, leading to establishment of reporting program but lacking public disclosures and rewards.

      John Deere's alleged perfect security on their farming equipment, which includes a kill switch capability, was put to the test by a security researcher. Despite having no formal bug bounty or disclosure program in place, the researcher was able to uncover vulnerabilities and even obtain information on private owners of individual pieces of hardware. The potential implications of these vulnerabilities are significant, as anyone gaining access could potentially compromise the tech underpinning a large portion of the world's food supply. Homeland Security intervened due to food security concerns, leading John Deere to eventually establish a reporting program, but it still lacked public disclosures and monetary rewards for discovered vulnerabilities. This incident highlights the importance of robust security practices and formal vulnerability disclosure programs in critical infrastructure sectors.

    • Hacking in Agriculture: A Threat to Food Supply and National SecurityThe potential danger of hacking in agriculture is significant due to the large scale and potential for endangering lives. Continuous efforts to create and bypass restrictions waste resources and could be better spent on advancing and securing systems.

      Our reliance on large-scale farming and advanced agricultural technology, which can be vulnerable to hacking, poses a significant risk to our food supply and national security. The potential danger of hacking in the agricultural sector is on a much larger scale than in other industries, as it could endanger lives. The cat-and-mouse game between rule-makers, enforcers, and rule-breakers results in a continuous cycle of creating and trying to bypass restrictions. This cycle wastes valuable resources that could be used for advancing and improving the systems instead. An extreme example of this is the use of a "kill switch" by security researchers to demonstrate the danger of such vulnerabilities, as seen in the case of Medtronic's medical devices. Ultimately, society may be better off focusing on advancing and securing these systems rather than trying to control them through restrictions.

    • Hacking Collectively Owned Assets: Potential ConsequencesHacking collectively owned assets could lead to misuse, control over essentials, and targeting specific groups, highlighting the need for robust security measures

      The future of collectively owned and licensed assets could bring about new challenges, such as potential misuse by hackers. The discussion revolved around the recent hacking incident involving smart tractors and the potential consequences if hackers were to turn off everyone else's assets instead of just stealing them. The speakers also touched upon the possibility of hackers targeting specific groups to gain control over everyone else's assets. The cost of essentials like bread in such a scenario was also raised as a question. Overall, while the idea of collectively owned assets holds promise, it's crucial to consider and address potential risks and challenges that come with it. For more in-depth insights, check out Corey Dobrow's article on the hacking community. A big thank you to our new patron, Christian Grubbs, and our returning patrons, Austin Starling and Brody. If you enjoy our show, consider supporting us on Patreon. Until next time!

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    209. Life in an Attention Economy

    209. Life in an Attention Economy

    Across the world, people watch more than a billion hours of video on YouTube every day. Every minute, more than five hundred additional hours of footage are uploaded to the site, a technical feat unmatched in the history of computing. YouTube invented the attention economy we all live in today, forever changing how people are entertained, informed, and paid online. Everyone knows YouTube. And yet virtually no one knows how it works.

    In this episode of BIC talks, Mark Bergen, Business and Tech journalist and author of the book, Like, Comment, Subscribe is in conversation with Padmini Ray Murray, researcher and founder of Design Beku; and reveals the riveting, behind-the-scenes account of YouTube’s technology and business -how it helped its parent company Google achieve unimaginable power, introduces the narrative told through the people who run YouTube and the famous stars born on its stage. It’s the story of a revolution in media and an industry run amok, how a devotion to a simple idea—let everyone broadcast online and make money doing so—unleashed an outrage and addiction machine that spun out of the company’s control and forever changed the world.

    Subscribe to the BIC Talks Podcast on your favourite podcast app! BIC Talks is available everywhere, including iTunesSpotifyGoogle PodcastsCastboxOvercast and Stitcher.

    DRM - 210.VYSÍLÁNÍ

    DRM - 210.VYSÍLÁNÍ
    Dnes si budeme povídat na téma: Vzhůru do oblak. Možná ti to připomíná jeden animovaný film ale věř tomu, že nás to inspirovalo k daleko zajímavějším příspěvkům. Moc rádi si s tebou o tom popovídáme a proto se neboj nám napsat přímo do vysílání.
    Věříme, že si tohle vysílání užijete stejně jako my.

    Monopoly

    Monopoly

    Reilly and Geoff read reviews about the board game Monopoly and discuss traditional cheating, Logan Roy losing it all, and immoral keynote speakers!


    Follow Reilly and Geoff:

    IG: @reillyanspaugh & @geoffreyjames

    Twitter: @reilecoyote & @GeoffBoyardee


    Advertise on Review Revue via Gumball.fm

    See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Private Equity is Killing the American Economy, with Josh Kosman

    Private Equity is Killing the American Economy, with Josh Kosman

    Josh Kosman has been covering the financial industry for twenty-five years. He is a reporter for the New York Post, a former editor at Mergermarket.com and a former senior writer for The Deal and Buyouts Newsletter. 

    Josh also literally wrote the book on private equity – his The Buyout of America: How Private Equity is Destroying Jobs and Killing the American Economy, published in 2009, made a big political impact at the time, with Obama advisor David Axelrod reportedly using it as the basis for his attacks on Mitt Romney during the 2012 presidential campaign.

    Private equity and mergers. The FTC and DOJ are, according to Capitol Forum reporting, taking a harder stance on private equity firms as potential divestiture buyers for assets companies are proposing to sell in their attempts to cure anticompetitive mergers.

    Private equity and rising interest rates. Josh’s website details how “Moody’s in May 2020 reported that two-thirds of the companies with the lowest debt ratings” were private equity-owned. “Standard & Poor’s in February 2020 reported $1.5 trillion in speculative-grade US corporate debt matures through 2024…Roughly 60 percent of the money has been borrowed by private equity firm-owned companies. With interest rates rising this poses a big risk.” Josh adds.

    Private equity’s political power. Josh is also expert on private equity’s political influence, and has written about Senator Kyrsten Sinema’s (D-AZ) support for the industry and President Joe Biden’s ties to Carlyle Group Co-Founder David Rubenstein.