this post was submitted on 10 Apr 2026
1 points (100.0% liked)
Pulse of Truth
2354 readers
8 users here now
Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).
This community is automagically fed by an instance of Dittybopper.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
What you are describing sounds very, very different from the hacking (and repairs) when it comes to John Deere tractors. The repairs are almost purely replacement or refurbishment of mechanical, hydraulic, and/or electric assemblies that comprise the machine. Meanwhile, the hacking is primarily using software to gain access to diagnostic information from the onboard computer.
This is a case where John Deere could eliminate very nearly 100% of the motivation to hack their tractors by letting their customers have access to the data created and stored by the machine they bought.
Conversely, as far as I understand it, if someone modified your product in an unintended way, in contravention to your instructions, you would have been within your legal rights to refuse them repairs as long as their changes caused the damage (or prevent the repairs). This is true whether or not what they did constituted "hacking" in a technical sense.