Tesla Autopilot Victim’s Family Alleges Deadly Design Flaws

Deadly design defects of Tesla have been a theme on this blog for a decade already. Still no regulation in America? Apparently we just get lawsuits like this one.

This case is not an isolated incident. Last year, the California DMV found Tesla violated state law by using misleading terms like “Autopilot” and “full self-driving capability” in their marketing. Seattle University law professor Steve Tapia, who is not involved in the case, noted there have been similar lawsuits against Tesla nationwide.

Tapia also referenced a case involving a Florida jury’s decision last year to award more than $240 million in damages to victims of a deadly crash involving the Autopilot feature.

“When you see a pattern like this, and especially when it’s involving products, it’s hard to say that the manufacturer is not liable,” Tapia said. “And ultimately, none of this would be happening if it didn’t have the Autopilot feature, so in terms of root cause, it sort of seems to be a Tesla design problem.”

Autopilot is defective by design. Tesla should be liable.

Research: Ultra Processed Food (UPF) Addictive Like Cigarettes

Put your Pringles can down for a minute and read this:

A study by researchers at three United States universities claims to have identified similarities between the addictive characteristics of ultra-processed foods (UPFs) and cigarettes, and has recommended similar levels of regulation.

According to the study, which was published this week in the Milbank Quarterly healthcare journal, UPFs “share key engineering strategies adopted from the tobacco industry” which are designed to drive “compulsive consumption.”

Designed?

UPFs are not just nutrients but [are] intentionally designed, highly engineered and manipulated, hedonically optimized products.

Hedonically? This sounds like something that would be used to target oppressed communities with a dangerous illusion.

Responding to the Milbank Quarterly study, Dr. Githinji Gitahi, the chief executive of Kenya-based NGO Amref Health Africa, warned of a “growing public health alarm” across Africa.

“Corporate [organizations] have found a comfortable, and profitable, nexus: weak government regulation on harmful products and a changing pattern of consumption,” he told The Guardian. “This places new and preventable pressures on already stretched health systems.”

Trump Guts Security of Nuclear Plants to Feed Lust for AI

Grab’em by the fuel rods.

What Pennsylvania officials told residents about Three Mile Island. In the 1970s they at least pretended to inform the public. Now they don’t even do that.
TMI safety for kids. Source: Nuke’em Postcards

Three Mile Island is a lesson apparently lost on the billionaire tech kids riding Trump’s descent into madness.

NPR obtained copies of over a dozen of the new orders, none of which is publicly available. The orders slash hundreds of pages of requirements for security at the reactors. They also loosen protections for groundwater and the environment and eliminate at least one key safety role. The new orders cut back on requirements for keeping records, and they raise the amount of radiation a worker can be exposed to before an official accident investigation is triggered. […] Backers of the reactors, including tech giants Amazon, Google and Meta, have said they want the reactors to one day supply cheap, reliable power for artificial intelligence.

The integrity controls aren’t being circumvented, they’re being rewritten by the entity charged with enforcing them, then shared with the regulated parties while being withheld from the public.

That’s not deregulation, that’s capture.

That’s privatization of the regulatory framework by the regulated to deny safety. The paperwork now follows action, not the other way around, which is how dictatorship works. It’s all fake accountability that tracks to pure corruption.

The nuclear regulator literally has been reorganized as a service provider for the entities it regulates. Like how ICE are just stormtroopers loyal to Trump, refusing to follow law or respect the Constitution. The criminals now are the ones wearing the badges, occupying political spaces to prevent anyone from invoking actual law that would stop crimes.

Got ICE?

Over 500 pages of necessary security directives were slashed and burned down to 23 pages, for reactors that use higher levels of enriched uranium in their cores, which make them targets of theft.

More attractive targets, less security. This batshit threat model logic is by a small group of elites who plan to profit rapidly and hide, regardless of increased and widespread suffering.

Materials security for weapons-grade fuel, gutted so billionaires can shave construction costs?

No wonder the Big Tech boys keep buying their own islands, to isolate themselves from nuclear catastrophe they are rushing everyone else into.

Google Founder Larry Page Would Rather Die Self-Imprisoned on Desert Island Than Pay a Cent for Freedom

Life’s a Breach: Notepad++ Integrity Compromised by China

The Stupid. It Burns.

Six months of nation-state access to highly targeted networks simply because a widely-deployed tool treated TLS as the one and only integrity verification (rather than what it is, transport security).

The “sophisticated” attack reads like a tourist getting their wallet stolen from their beach chair while they went for a swim without it. Easy pickings, for someone to exploit unsophisticated engineering.

I love reading Dan Goodin, perhaps my favorite tech reporter of all time, but his article buries the lede:

…insufficient update verification controls that existed in older versions.

That’s the whole game, right there.

All the threat intelligence theater with chill names like “Chrysalis” and “Lotus Blossom,” with all the attribution to China-state actors getting “hands-on-keyboard” drama, obscures that this is a solved problem since at least 2005. Like twenty years ago Microsoft OEM’d an Israeli patching company and said oh shit we need to sign code, and that should have been the end of it, right?

Linux package managers have done cryptographic signature verification for many decades. Use of apt, yum, pacman, etc means you verify GPG signatures against pinned keys before execution. Done and dusted. This fix is older than many of the people involved in this disaster.

Why am I even writing about this?

The attack chain was to intercept update requests, redirect to a malicious binary, and let it execute. A checksum alone won’t save you here—if the attacker owns the distribution infrastructure, they serve bad binary and matching hash.

Self-consistent fraud.

The actual integrity breach fix is an asymmetric signing architecture. Key handling is the key. The developer signs a binary with a private key that never lives on update infrastructure. The client verifies against a public key pinned in the already-installed binary. Own the servers all you want—you can’t forge the signature without a properly hidden private key.

Here’s the part that should make you spit tea all over your screen. Or maybe that’s just me. They had signing. From Beaumont’s razor sharp analysis:

The downloads themselves are signed—however some earlier versions of Notepad++ used a self signed root cert, which is on Github.

Nice.

The lock was in the door and the key for it was… too. The integrity mechanism existed in form but not in function. A self-signed cert with the key published on GitHub means anyone who could redirect traffic could also forge valid signatures. That’s sad theater, an appearance of an integrity control when it doesn’t actually constrain anything.

Does content-addressable integrity need better marketing or something? I don’t get it. The transport layer is a layer for defense in depth, which someone confused with the core package integrity mechanism itself. And the actual signing layer, which should have been the real gate, was all hat no cattle.

Resources probably were allocated entirely into features and user growth. Someone went into transport layer security, yet didn’t bother to understand the limitations. The missing content integrity controls are a predictable catastrophic failure.

No regulators apparently required the basic cryptographic verification that actually prevents this. So the distribution of content never innovated on authenticity. Now we have to read about an integrity breach, a software developer scrambling to apologize and patch late what should have been there since twenty years ago.

Solved cryptographic engineering. Same pattern, always. You see it everywhere these days. A consent banner that doesn’t constrain data collection. An operations audit that doesn’t examine infrastructure. The signature that doesn’t verify authenticity.

The presence of a control, without regulations to ensure innovation around standards of care, can become dangerous cover for its absence.