Event JSON
{
"id": "56aa83b0659e62802cd9089b59c90259030cc05aba131037185b13ebec7a6994",
"pubkey": "d2ebf9a73caf6f7ebe07f83b6559e2699f6265fff0e32216ccaa99bf58cc9d3b",
"created_at": 1747507647,
"kind": 1,
"tags": [
[
"t",
"cybersecurity"
],
[
"proxy",
"https://infosec.exchange/@geeknik/114524661161907890",
"web"
],
[
"t",
"iotfail"
],
[
"t",
"hackedonwheels"
],
[
"proxy",
"https://infosec.exchange/users/geeknik/statuses/114524661161907890",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/geeknik/statuses/114524661161907890",
"pink.momostr"
],
[
"-"
]
],
"content": "Volkswagen’s app leaked internal credentials in plain text—allowing hackers to unlock, track, or even start cars remotely. Your ride just became a rolling data breach. Who’s really in the driver’s seat? #Cybersecurity #IoTFail #HackedOnWheels \nhttps://loopsec.medium.com/hacking-my-car-and-probably-yours-security-flaws-in-volkswagens-app-24b34c47ba89",
"sig": "db6c68e2dc44abaf6c5f6bbd88c93b6fbe4ab7332ee07db81e13a604fbddf4cd658cfbcbfe2367f556b3df71efe56be44d8714f9297e2c1f89e16c1d69d45da7"
}