Only the cyber truck. Model S and 3 refreshes are still on the legacy platform, with a lithium ion 12V.
CyberSeeker
This server, maintained by Internet carrier Cogent Communications
Found the problem!
So the article repeats, several times, “waymo relies on remote operators”. I don’t think the author knows what “self-driving” means.
The Model S Plaid, MG, Rimac Niverra, etc are increasingly limited by regulations more than anything. Quite literally, they are at the limits of rolling friction for street legal tires, which is why you’re not seeing a lot of variance at the top of the market.
So if ISPs are once again Title II common carriers, how can they enforce the TikTok ban? 🤔
I believe this is already the case; domain reputation is weighted pretty heavily by Gmail and others, so it will take some months before you’ve established enough rep. Following SPF/DMARC/DKIM is crucial, followed with time your domain has been registered and typical outbound volume from your domain.
That’s the benefit of a custom domain, I suppose; you can always change he provider without changing your email.
Shouldn’t be this hard to find out the attack vector.
Buried deep, deep in their writeup:
RocketMQ servers
I’m sure if you’re running other insecure, public facing web servers with bad configs, the actor could exploit that too, but they didn’t provide any evidence of this happening in the wild (no threat group TTPs for initial access), so pure FUD to try to sell their security product.
Unfortunately, Ars mostly just restated verbatim what was provided by the security vendor Aqua Nautilus.