The most thought provoking article I have read this week:

A Norwegian bus company wants to know if their buses could be abused by China in the case of war.

So they drive two buses deep into a limestone mine to isolate them from the internet and forensically investigate how they work.

In the mine, investigators discover a Chinese kill switch which could destroy all Chinese buses.

In Denmark, that is 57 percent of the bus fleet.

Source (Danish):

https://www.zetland.dk/historie/svNwC3c5-aOPVxA4K-224e5

Dybt i et norsk fjeld blev en kinesisk bybus splittet ad. En status på vores frygt

En kinesisk bus blev nøje analyseret for mystiske signaler.

Zetland
@randahl "Wer Billig kauft, kauft zweimal" ... means "Who buys cheap, buys twice"
@[email protected] Ich widerspreche. Die Chinesen bieten keineswegs zwei Modellvarianten an billig-mit-killswitch, teuer-ohne-killswitch. Killswitches wurden auch in Staubsaugern gefunden und da praktisch dieselbe Firmware in Geräten niedrigpreisiger und hochpreisiger Hersteller verwendet wird, dürften wohl auch die meisten Staubsauger killswitches haben. Ebenso wurde ein killswitch in Zügen eines polnischen Herstellers gefunden. Und wahrscheinlich hat einfach nur noch niemand nach den killswitches in toastern, geschirrspülern, Fernsehern, türklingeln, GPUs, röntgengeräten, kreditkartenterminals, ergometern, Joysticks, Fitnessringen, Parkhausausfahrschrankensteuerungen, Wechselrichtern, hoteltresoren, Kameras am Kanzleramt, 5G-Mobilfunkantennen, tamagotchis, Airbags, Airtags, Aircondionern, Brotbackautomaten, Herzschrittmachern, Cochleaimplantaten, Glühbirnen, Geldautomaten, kettenkarusellen und Heizungen von Aquarien gesucht. @[email protected]

@titanmanfred @randahl John Deere tractors aren't cheap, to buy or to repair.
I wonder where the Chinese got the idea of software/IP lock in from?

https://pluralistic.net/2022/08/15/deere-in-headlights/#doh-a-deere

Pluralistic: 15 Aug 2022 – Pluralistic: Daily links from Cory Doctorow

@titanmanfred @randahl just to amplifiy this point. Nearly all internet connected devices have a kill switch.

Teslas have a kill switch
Your ISP supplied router has a kill switch
Your phone has a kill switch
Your Windows computer has a kill switch
Your programmable bed has a kill switch
Your robot vacuum has a kill switch
Your MS Mail account and your Bank account has a kill switch (ask ICC judges)
Your data in the US owned cloud (even if hosted in Europe) has a kill switch
F35 planes, NATO donated to Ukraine, have a kill switch.
Your Polish locomotive has a kill switch (activated if you try and use an independent repair shop).
All these have been mentioned in the news and in the Fediverse recently.

Most of these are controlled by US or Chinese companies. Particularly with Trump in charge and alll the tech Billionaires subbing him are you sure that the American ones are less lilkely to be used against you by the USAian companies than the Chinese companies to disable your kit and maybe your life?a

@marjolica @randahl lukily I am not using many of these toys :-)
* my cars are 1975 and 1990
* using Linux since 20years
* ...
@DrEdBridges @titanmanfred @marjolica @randahl you should probably save that one for when linux isn't just mentioned in passing and also relevant to the discussion.
@titanmanfred @randahl I'm a Linux user since 1993.
My car dates from 2015 and is not internet connected. It seems to be something that only became ubiquitous in the last 10 years.
I gather the only useful feature (but didn't require the internet) added was to alert recovery services that you had an accident but even that was inadvertently immobilising your car if your passenger air bag deployed in a drivable incident.
@titanmanfred @marjolica @randahl any computer processor produced after 2007 had a backdoor with kill switch, that includes Intel, AMD, ARM, Qualcomm (Android).
The only exception is Risk V
@titanmanfred @marjolica @randahl All big company products are like this. You can't trust capitalism.
To cite a few, Google, Tesla, Apple, Volkswagen, Microsoft
@marjolica
I second that. Basically everything, that could be updated remotly can have a kill switch.
On the software/cloud/compute side everything has a killswitch, when it is controlled by any third party. Most of the time it's to ensure you pay your bill and to keep the shareholders happy. This recent blog post from Cory Doctorow wrote about that reality.
https://pluralistic.net/2025/10/20/post-american-internet/
@titanmanfred @randahl
Pluralistic: The mad king’s digital killswitch (20 Oct 2025) – Pluralistic: Daily links from Cory Doctorow

@marjolica @titanmanfred @randahl
Or they pirated the firmware, not even realising the kill switch is there.

@randahl US made John Deere tractors also have a kill switch and it has been used to disable some of them (in this case tractors stolen by Russian troops) remotely:

https://orchardandvine.net/news/john-deere-%E2%80%98kill-switch%E2%80%99-renders-stolen-tractors-useless/

https://edition.cnn.com/2022/05/01/europe/russia-farm-vehicles-ukraine-disabled-melitopol-intl/index.html

(EDIT: this was also mentioned briefly in the Danish article linked above)

John Deere ‘Kill Switch’ Renders Stolen Tractors Useless

John Deere has struck a blow against the Russian Army, in its war of aggression in Ukraine.

orchardandvine.net
@osma @randahl All closed-source software, not just the embedded software in these vehicles and others, must be assumed to have a kill switch. Microsoft, Google, Amazon... And a master kill switch in the White House. Cutting the cord, like, yesterday is a matter of national survival.

@martinvermeer Right. Though I think it's somewhat misleading to talk about a "kill switch" in these cases. These devices simply have a remote update mechanism that is normally used to push firmware updates and it's possible to use that mechanism to send an update that bricks the whole machine. A "kill switch" doesn't have to be an explicit part of the design, just a consequence of being able to send software updates.

@randahl

@osma @randahl Correct - but the effect is the same. That's why I used it as a metaphor. The same happened in the media with the F-35 'kill switch', which really isn't, or at best metaphorically.
The F-35 situation is somewhat more acute: to maintain stealth in hostile airspace the aircraft must have a very fresh map of its radio environment. It's not an option to fly combat without the latest update.
@martinvermeer @osma @randahl
@osma @randahl true, but Russian engineers are quite capable to jailbreak such machinery. Again, the kill switch and sensor data collection are only intended to enforce US corporate monopolies with paying customers and governments playing the kapitalist game by the rules, not to prevent from theft nor acts of war. It's all about the money, more precise, stealing our well earned money.

@randahl To be honest: I'd love a broad scale analysis of this. Few days ago it as a vacuum cleaner, now buses...

Test this in all things. From mobile phones to cars (don't care if Chinese, US or German), smart beds (well... actually leave these ones out. Who buys a bed that needs internet?!), switches, routers, water pumps, ....

I bet they'll find stuff in too many places.

@jesterchen I would like all hospital equipment to be tested.
@randahl And everything for critical infrastructure (water supply etc). The rest are details.

@jesterchen @randahl here's one, everthing is Chinese: solar panel infrastructure: https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/

There were suggestions badly managed solar inverters contributed to the widespread blackouts around Spain this summer.

@janvenetor @jesterchen @randahl I've also heard from people in the industry that the jump to blame renewables by the usual suspects was predictably completely made up and untrue.

I forgetthe details but it was basically under maintained older infrastructure in the interconnectors between regions and countries.

@mossman @jesterchen @randahl yes, and renewable utilities place more demands on the already thinly spread and unmaintained infrastructure..

Suddenly losing large percentage of production will cause blackouts.

(I've been a huge PV fan for more than a decade
, when it was evident it will wipe the floor with all other forms of electricity.

Building any infra on internet of shit, chinese and/or networked components will still backfire.)

@janvenetor @jesterchen @randahl okay, but the point being made in the interview I listened to is that the cascade had literally nothing to do with renewables in the Spanish blackout. IIRC it was an interconnector failure between France and Spain which would have happened whatever power sources were on the respective grids.
@mossman @janvenetor @jesterchen @randahl the majority of solar and battery kit has internet cloud stuff. A few can run without it but not many. It's a huge risk but mostly a 'supplier goes bust' risk IMHO. Some companies definitely exploit it though as a choke point - with things like guarantee invalidation if your device doesn't regularly connect or to load on subscription services that could be done better for free on open platforms. Real issue though - look up deye bricking grey imports

@mossman @janvenetor @jesterchen @randahl

The former head of the Spanish grid operator, a big renewables proponent, said explicitly afterwards that he had been telling the government all during his tenure that the additional grid stress caused by wind and solar coming on and off were going to require substantial investments in transmission and switching, or there were going to be spectacular large-scale failures ; and every budget year the treasury kept putting him off.

@publius @janvenetor @jesterchen @randahl Okay, that may be true but I think we're mixing up *potential* problems with what the actual cause of that blackout was, which was an unrelated switch failure or something.
@randahl there is a little thing called a specification when you buy something. You need to be absolutely sure you have full control over your technology you own.
Some people might find open hardware and open source guys annoying but this what they talk about.
@peteriskrisjanis they're at least twice as annoying when they're saying 'I told you so' :)
@randahl

@randahl Not just China doing this. I remember https://arstechnica.com/tech-policy/2023/12/manufacturer-deliberately-bricked-trains-repaired-by-competitors-hackers-find/

It is generally not a good idea to give others control over apparatuses that you own.

Trains were designed to break down after third-party repairs, hackers find

The train manufacturer accused the hackers of slander.

Ars Technica
@ArtHarg wild. Thanks for that link.

@randahl @ArtHarg

you have plenty of this, everywhere
one of my favorite is farmers using hackers to be able to self-repair their tractors...

https://copperhilltech.com/blog/farmers-are-hacking-their-tractors-because-of-a-right-to-repair-ban/

Farmers Are Hacking Their Tractors Because of a Right to Repair Ban

For decades, American farmers have been at the mercy of agricultural equipment manufacturers, who have locked down their tractors with proprietary software, restricting repair options and forcing owners to seek expensive, manufacturer-approved service providers. In response, a growing number of farmers are resorting to hacking their own tractors, using underground software tools and firmware modifications to regain control of their equipment. At the heart of this battle is the right to repair—an issue that has implications far beyond agriculture. The Right to Repair Controversy Modern tractors, such as those produced by John Deere, Case IH, and other leading brands, are no longer just mechanical workhorses; they are complex, software-driven machines. Manufacturers argue that restricting access to proprietary software is necessary for safety, emissions compliance, and intellectual property protection. However, this has left farmers unable to diagnose or fix even minor issues without paying hefty fees or waiting for authorized service technicians, which can be costly and cause delays during crucial planting and harvesting seasons. The right to repair movement advocates for legislation that would grant farmers access to diagnostic tools, software, and replacement parts, allowing them to fix their own equipment or seek third-party repairs. While some states have passed right to repair laws, the agricultural sector remains a battleground due to manufacturer resistance. How Farmers Are Fighting Back In response to these restrictions, farmers and independent technicians have turned to hacking solutions to circumvent manufacturer-imposed software locks. This often involves modifying firmware, using cracked versions of diagnostic software, or sourcing repair tools from black markets in Eastern Europe and China. One of the most popular underground tools is an unauthorized version of John Deere’s Service Advisor, a diagnostic program that allows technicians to troubleshoot and repair tractors. By using these hacked tools, farmers can bypass manufacturer restrictions, unlock hidden features, and make repairs that would otherwise require a costly service call. The Role of SAE J1939 in Tractor Hacking A critical piece of the puzzle in tractor hacking is the SAE J1939 protocol. SAE J1939 is an industry-standard network communication protocol used in heavy-duty vehicles, including agricultural machinery. It is built on the CAN (Controller Area Network) bus system, which allows electronic control units (ECUs) within a tractor to communicate with each other. For farmers and independent mechanics, access to SAE J1939 data can be a game-changer. It allows them to retrieve diagnostic trouble codes (DTCs), monitor engine performance, and even override certain restrictions imposed by manufacturers. Some enterprising farmers have developed custom software and hardware tools to interface with the J1939 system, enabling them to reprogram ECUs or unlock proprietary functions that are otherwise hidden behind manufacturer restrictions. Hacking J1939-enabled tractors typically involves connecting a laptop or diagnostic tool to the tractor’s CAN bus via an OBD-II or 9-pin diagnostic port. With the right software, farmers can analyze the data stream, identify faults, and apply fixes without needing a manufacturer’s approval. However, this practice exists in a legal gray area, as modifying ECU firmware may violate software license agreements or the Digital Millennium Copyright Act (DMCA). Legal and Ethical Implications The hacking of tractors raises significant legal and ethical questions. While farmers argue that they should have full ownership over their equipment, manufacturers counter that unauthorized modifications could lead to safety hazards, increased emissions, or even liability issues. The DMCA's anti-circumvention provisions currently criminalize the act of bypassing software locks, even for legitimate repair purposes. However, advocacy groups such as the Repair Association and Public Knowledge have been pushing for exemptions that would allow farmers to legally access and modify their tractor software. In recent years, lawsuits and legislative efforts have brought attention to the issue. In 2022, John Deere signed a memorandum of understanding (MOU) with the American Farm Bureau Federation, pledging to provide farmers with greater access to repair tools and software. However, critics argue that this agreement lacks legal enforcement and does not go far enough in guaranteeing farmers' rights. The Future of Right to Repair in Agriculture The fight for the right to repair is gaining momentum. Several U.S. states, including Colorado and New York, have passed right to repair laws covering agricultural equipment. At the federal level, the Fair Repair Act has been proposed to mandate broader access to repair tools across various industries. Farmers, mechanics, and advocacy groups continue to push for stronger protections that would ensure that equipment owners have full control over the machines they depend on. Until comprehensive right to repair laws are enacted, hacking may remain a necessary, albeit risky, solution for farmers who refuse to be locked out of their own equipment. Conclusion The battle over tractor repair rights underscores a larger conflict between corporate control and consumer ownership. As manufacturers tighten their grip on agricultural technology, farmers are fighting back with ingenuity, hacking skills, and grassroots activism. The SAE J1939 protocol has emerged as a key battleground in this fight, offering both an opportunity for empowerment and a potential legal minefield. With the future of farming increasingly dependent on software-driven machinery, the outcome of the right to repair debate will shape the agricultural industry for generations to come. Whether through legislation, legal battles, or underground hacking efforts, farmers are making it clear: they will not surrender their right to fix the tools of their trade. SAE J1939 to USB Gateway for Network Analysis The SAE J1939 gateway provides a comprehensive solution for monitoring, simulating, and recording any Parameter Group Number (PGN) as specified in the SAE J1939-71 standard. Additionally, it supports the analysis of diagnostic messages in accordance with the SAE J1939-73 standard, making it a versatile tool for troubleshooting and performance optimization. To enhance usability, the gateway is fully compatible with our free JCOM1939 Monitor software, a powerful Windows-based application designed for SAE J1939 monitoring, in-depth analysis, and ECU simulation. This software allows users to visualize real-time data, decode network traffic, and perform advanced diagnostics, making it an essential tool for engineers, developers, and technicians working with SAE J1939 systems. More Information...

Copperhill
@ArtHarg @randahl meanwhile, the inverter for my solar panel installation is also remotely controlled by its Chinese manufacturer. I had to email them to request access to its Settings menu. Bugs the hell out of me.
@ArtHarg @randahl Unfortunately, short of building your own car / bus / tractor from the ground up...
@ArtHarg @randahl I suspect it's not China doing it so much as Chinese vendors, and they do it for the same reason other vendors like the one you mentioned do it: control over their products. They want to be able to force you to buy their support subscription on pain of having your stuff not work without it.

@ArtHarg @randahl of course not only china.

Look at phones, tvs... Everything cloud connected.

They may not always have the kill switch, but for sure we don't have control over these products.

The Day My Smart Vacuum Turned Against Me

Would you allow a stranger to drive a camera-equipped computer around your living room? You might have already done so without even realizing it. The Beginning: A Curious Experiment It all started innocently enough. I had recently bought an iLife A11 smart vacuum—a sleek, affordable, and technologically advanced robot

Small World
@Randahl Fink but this is not particularly a chinese problem. last year there was a similar problem with a polish train manufacturer. they had a kill switch to make the engines stop when they had been serviced in a third party workshop instead in one of theirs

#^https://media.ccc.de/v/37c3-12142-breaking_drm_in_polish_trains
Breaking "DRM" in Polish trains

We've all been there: the trains you're servicing for a customer suddenly brick themselves and the manufacturer claims that's because you...

media.ccc.de
@randahl that'll be the day when Norway goes to war with China
@randahl arrrgh. I want to be less paranoid about China, but is it paranoia if it's true.?
@randahl What! 🤨 How would the switch destroy the bus? What's the trick?
@thierry_van_kerm for instance, systems that download software updates, could potentially download a software update which deliberately contains errors.

@randahl Is this really surprising?
And, btw, don't you think the US (or Russia) don't do the same?

Time for Europeans to grow up, to stand up and get their balls unleashed from whoever hold them tight! 🙂

@randahl @thierry_van_kerm which is also a risk even if the supplier is honest. It's how the Russians destroyed a whole load of satellite kit just before Ukraine kicked off. Compromise the vendor downloads and ship firmware that physically burns the flash memory. At that point it's probably a PCB swap to restore for most users. A PCB that won't be stocked in bulk, probably uses components no longer manufactured and cannot trivially be mass manufactured again.

@thierry_van_kerm @randahl

The article I read in English said "disable". In war-speak (Mission Task Verbs) I expect they could Degrade, Deny, Disrupt, or Neutralize.

Realistically direct china-norway conflict is improbable. If I were China, I'd just sell details of any security weaknesses of the system to the Russians.

If I were an infrastructure company (like busses) I'd try very hard not to buy electronics from a police-state. Easier said than done I'm sure!

https://cybernews.com/security/norway-china-electric-buses-remote-control/

#war #norway #infosec #bus #publicTransport #infrastructure #cyberResilience #sovereignty

Chinesische Busse in Oslo könnten von China aus gesteuert werden – sie fahren auch in Amstetten

Die Verkehrsbetriebe der norwegischen Hauptstadt testeten im Sommer neu angekaufte Fahrzeuge. Auch in Dänemark und in Niederösterreich fahren die Busse

DER STANDARD
@randahl with reference to some comments below, the USA is far worse on this topic. They call it intelectual property rights. Which makes you hand over all the sensor data of the John Deer plough, seeder or harvester to the USA mothership. Which is then sold to hedge funds to hedge against the price of the harvest you as a farmer have invested in and worked hard for. So your farm data is used by biljonairs to increase their wealth at the expense of the farmers https://doctorow.medium.com/about-those-kill-switched-ukrainian-tractors-bc93f471b9c8i
Medium

Medium
@randahl We live in a world where everything is backdoored, either intentionally or unintentionally.

Yet we all keep adopting new "technologies" ignorantly and digging our own graves day by day.

@randahl
The existence of a kill switch is one thing, but what's more fundamental here in the case of a bus is why on earth it has to be connected to the public internet in the first place?

It just doesn't make sense.

@shadowdancer I believe it had a SIM card embedded within it. Which could make sense for other onboard communication to the operator.

@shadowdancer @randahl They need to access the operator's network, so dispatchers know where each vehicle is (and this information can also feed real-time tracking for travelers). Outside of cities you cannot use radio as it would be too expensive and unreliable, the most practical solution is to use the public GSM network.

The issue at play here is the reliance on proprietary third-party software, usually packages that combine both dispacher software and ticket handling. These include remote updates (you cannot have maintenance technicians or drivers run around with computers or even USB drives, it's not practical), so unless you have full control and full trust over that software your fleet now has remote kill switches.

One solution is to make all the required software in-house, but most public transports operators are too small to handle such development and the associated costs. LeTEC in Belgium has been doing this for the past 15 years, for a fleet of 3000 vehicles. It's a lot of work.

What we need is a pan-european cooperative to build these systems for all operators.

Peraphs not..

@randahl

We must ask ourself where this suspious comes from? I've get you a clue in the interview linked below.

@umbe @randahl cringy. and very suspect.
@randahl Buying 'European' wont solve the problem, https://www.kaspersky.com/blog/train-hack-37c3-talk/50321/

"Tor Indstøy and his team find no evidence of this. And that is positive. But they find something else. The Chinese electric bus contains a computer that, among other things, controls the bus's battery and motor, so that the bus can most efficiently drive around Oslo. And this computer is – via a small SIM card – on the Internet, so that it can send information and sometimes retrieve an update. Because yes, a bus can be updated in exactly the same way as your phone."

So busses can get new firmware, but there's no evidence that they can be force loaded. I'm sorry this is just weak, but also remove the SIM card and your non-existant problem is gone.
Hacking a train: a 37С3 talk

How white hats from Dragon Sector hacked into trains to fix them, but discovered manufacturer-installed malicious implants and backdoors in their software.

Kaspersky
@randahl There's also zero evidence of a kill switch at all.