Autonomous Vehicles (4)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 5 min
- MIT Technology Review
- 2019
Humans take the blame for failures of AI automated systems, protecting the integrity of the technological system and becoming a “liability sponge.” It is necessary to redefine the role of humans in sociotechnical systems.
- MIT Technology Review
- 2019
-
- 5 min
- MIT Technology Review
- 2019
When algorithms mess up, the nearest human gets the blame
Humans take the blame for failures of AI automated systems, protecting the integrity of the technological system and becoming a “liability sponge.” It is necessary to redefine the role of humans in sociotechnical systems.
Should humans take the blame for algorithm-created harm? At what level (development, corporate, or personal) should this liability occur?
-
- 7 min
- MIT Technology Review
- 2019
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
- MIT Technology Review
- 2019
-
- 7 min
- MIT Technology Review
- 2019
Hackers Are the Real Obstacle for Self-Driving Vehicles
Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.
Had you considered this big obstacle in self-driving? How would this risk impact the business of self-driving vehicles? What are the consequences of companies not fully understanding the machine algorithms that they use? Should we use self-driving vehicles when this threat stands?
-
- 3 min
- Kinolab
- 2020
Nathan, a computer programmer, lives in an imagined version of 2033 in which all cars are equipped with a vocal assistant and an autonomous drive program. When he takes control of his own car and drives recklessly, he is pulled over by a police drone. Eventually, he meets his demise when the autonomous drive in his car fails to recognize a parked truck in the middle of the road.
- Kinolab
- 2020
Self-Driving Vehicles and Drone Traffic Stops
Nathan, a computer programmer, lives in an imagined version of 2033 in which all cars are equipped with a vocal assistant and an autonomous drive program. When he takes control of his own car and drives recklessly, he is pulled over by a police drone. Eventually, he meets his demise when the autonomous drive in his car fails to recognize a parked truck in the middle of the road.
What are the dangers of autonomous drive programs? Should AI be trusted to handle potentially lethal situations? What are the pros and cons of using police drones instead of police cars to monitor traffic? What are the benefits of using self-driving vehicles? How can they free up their owners to do other work or spend leisure time, without the need for human labor? In the case of mistakes made by these vehicles, is the owner responsible or the vehicle?
-
- 3 min
- Cyber Security News
- 2025
Tesla’s famous wall charger, which is installed in homes and businesses worldwide, gets hacked through the charging cable on the adapter. The adapter had a previously undocumented feature that allowed Tesla vehicles to update it through the charging cable, and hackers were able to exploit this vulnerability. After being able to execute arbitrary code on the device, hackers may gain access to the local network that the charger is connected to—among other things.
- Cyber Security News
- 2025
-
- 3 min
- Cyber Security News
- 2025
Tesla Wall Connector Hacked in 18 Minute Attack
Tesla’s famous wall charger, which is installed in homes and businesses worldwide, gets hacked through the charging cable on the adapter. The adapter had a previously undocumented feature that allowed Tesla vehicles to update it through the charging cable, and hackers were able to exploit this vulnerability. After being able to execute arbitrary code on the device, hackers may gain access to the local network that the charger is connected to—among other things.
- What measures may be taken by Tesla (besides not documenting the feature altogether) to make the security on the wall adapter more robust?
- What responsibility does Tesla have in this situation towards its customers?
- What next steps should be taken to prevent this vulnerability from being exploited in Tesla wall adapters around the world?