I wish I could hack my Lexus RX350's LKAS. It's pretty bad and seems to bounce left and right between the lanes. It gets to the point that I just shut it off since I don't want to fight it when driving long distances as it's very tiring. It's probably a timing issue as the computer isn't getting updates fast enough and has to keep correcting which causes the bouncing between the lane. A Tesla this is not!
> On the Q8, the FlexRay bus has cycle time of 5 ms, so each ECU can send messages at 200 Hz.<p>That's weirdly worded. The cycle repeats (disregarding multiplexed PDUs) every 5 ms, but there are lots of messages within a cycle.<p>Even on CAN, it's not uncommon to have > 2000 msg/s (looking at Daimler trucks with 70% utilization).
I didn't get it, FlexRay usually uses end-to-end encryption and it seems that everything is in a plain text? Audi just decided not to encrypt something?
Is this a 'man in the middle' attack for 3rd party nefarious purposes, like controlling someone else's Audi ... Or just plain reverse engineering of a communications protocol to hack the software for 1st party education and extension? Why the click-baity title as if this is some great compromise to the integrity of the Audi? Am I missing something?