Originally Posted by mswlogo
I beg to differ. The Computer and Complexity in the Jeep is quite complex.
You may beg to differ all you like, but you're wrong
Something like Windows is a massive code base. There are so many points of entry to the system it's unbelievable; whether it's hacking at the application level, the windows framework layer, or the kernel layer underneath. The jeep software is not even a fraction of all the code that comes installed on a fresh install of windows 7 (for example).
Just as an example; windows at one point had a bug in how it handled parsing jpeg data; it was a low-level bug, almost any windows app that displayed jpegs would then use the library underneath it to do the work. Simply viewing a malicious web page in IE (or opening an email in outlook with the jpeg attached inline) was enough to screw you over. (This was back in early 2000's; starting to feel old...)
The amount of ways for a hacker to gain control of your computer is a million times greater than the few ways of accessing your jeep remotely. Yes jeep needs to fix this and fix it properly (separation of buses for a start), but there is need for chicken-little "sky is falling" paranoia.