TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

In-flight hacking system

5 点作者 TH3R3LL1K超过 8 年前

1 comment

sigposix超过 8 年前
Last job was at Panasonic Avionics' cross-town rival, Thales Avionics. From the many Panasonic veterans working at Thales, they mentioned our architectures were quite similar, so I will use what I know about Thales' system to make what could be a close comparison. You have a system called ACARS, which is an ancient technology that sends data from the cockpit to the IFE system (GPS, airspeed, etc). ACARS I believe is a 1-way protocol (think of it as an RSS feed where you can subscribe for updates) The only bit of communication that can go the other direction (I think) is BITE (built-in test environment) which is a centralized way for a technician to see status messages and error codes sent from individual components (such as each seat-back screen, power distribution boxes, switches, wireless access points, etc). The IFE systems we developed had separate satellite systems for internet connectivity from that of the cabin, including separate antennas. From my understanding, hacking an IFE system could mean gaining access to CC info, but it would be very very unlikely to take control of the plane from a seatback screen.