So, I drove in behind a Model S today, and my mind wandered through the following:
1. A Tesla Tap will let us mere mortals use a destination charger, but not a supercharger. The connector is the same, so it's not a mechanical issue.
2. Superchargers must have some protocol to identify which specific car is hooked up and throttle their output to match the charging capacity of the car, plus verify the account of the user (and charge for Model 3's).
3. It seems likely charging speed throttling will occur on superchargers, too, for a car that needs to get full full and throttled supercharger speed may be appropriate for our full speed charging.
4. I wonder if a person could monitor the bus traffic between a legit supercharger user and then play it back (likely with mods) to enable charging on a car like a Bolt. You would have to both get the right handshaking to get access to an account and turn down the current. Let's say you also own a Model 3, so could monitor your own car and enable usage to your own Tesla charging account. Maybe your M3 is even physically near that supercharger, too.
5. Then I wondered if the communication is rolling codes, encrypted, etc.
6. There may be active detection and denial by SuperChargers of TeslaTaps and similar convertors, or it may just be communication failed.
I'm not suggesting this, just wondering about the internal details of the matter.
It would have to be about the most obvious spoof ("Hey, there's a Bolt over on the Supercharger.") For an hour. In plain sight. There are huge risks with little gain.
I doubt there's any sort of exploit to be had, but it's curious to think about. As an engineer, a large part of my job is figuring out what users are going to try and blocking the users ahead of time from doing stupid or undesirable things.
Given that Tesla is constantly pushing out updates to both cars and charging stations, a patch would be fast and easily to deploy. It's also very likely there's significant protocols in place to prevent this.
A more mundane version would be, you own an S or X and a 3, then spoof your S or X communications to charge your 3 for free. Again, I expect it's been handled, but it gives me a smile to contemplate the possibilities..
1. A Tesla Tap will let us mere mortals use a destination charger, but not a supercharger. The connector is the same, so it's not a mechanical issue.
2. Superchargers must have some protocol to identify which specific car is hooked up and throttle their output to match the charging capacity of the car, plus verify the account of the user (and charge for Model 3's).
3. It seems likely charging speed throttling will occur on superchargers, too, for a car that needs to get full full and throttled supercharger speed may be appropriate for our full speed charging.
4. I wonder if a person could monitor the bus traffic between a legit supercharger user and then play it back (likely with mods) to enable charging on a car like a Bolt. You would have to both get the right handshaking to get access to an account and turn down the current. Let's say you also own a Model 3, so could monitor your own car and enable usage to your own Tesla charging account. Maybe your M3 is even physically near that supercharger, too.
5. Then I wondered if the communication is rolling codes, encrypted, etc.
6. There may be active detection and denial by SuperChargers of TeslaTaps and similar convertors, or it may just be communication failed.
I'm not suggesting this, just wondering about the internal details of the matter.
It would have to be about the most obvious spoof ("Hey, there's a Bolt over on the Supercharger.") For an hour. In plain sight. There are huge risks with little gain.
I doubt there's any sort of exploit to be had, but it's curious to think about. As an engineer, a large part of my job is figuring out what users are going to try and blocking the users ahead of time from doing stupid or undesirable things.
Given that Tesla is constantly pushing out updates to both cars and charging stations, a patch would be fast and easily to deploy. It's also very likely there's significant protocols in place to prevent this.
A more mundane version would be, you own an S or X and a 3, then spoof your S or X communications to charge your 3 for free. Again, I expect it's been handled, but it gives me a smile to contemplate the possibilities..