Hacker News new | past | comments | ask | show | jobs | submit login

And it's not like they'd ever abuse that ability, like when someone pokes around in their car and discovers references to a new unannounced model, and then Tesla reaches in, force downgrades the vehicle to older software with no references, and then disables the ethernet port on the vehicle, and for a final fuck you disables its ability to ever get another update.

They'd never do that, except when they did do that.




The Twitter thread linked by the link posted GP actually contained a reasonable explanation of why that happened. https://x.com/atomicthumbs/status/1032939644621545473




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: