Friday, March 29, 2024

Ex-Tesla Employee Sued for Uploading an Autopilot Source Code to his iCloud and Shipped to China

Former Tesla Employee Guangzhi Cao sued for illegally uploading the Tesla Autopilot source code into his personal iCloud Account in 2018 when he was one of the members of Tesla’s Autopilot team.

Tesla brings a suit against Cao for allegedly Stole Tesla’s source code and other company information as “trade secrets” and take those data to Xiaopeng Motors, Chinese based intelligent electric vehicle startup.

Xiaopeng Motors already faced a lawsuit for stealing the trade secrets which is related to another case that held in last year, a former Apple employee was arrested for stealing the files related to Cupertino’s self-driving car and bringing to China where he intended to move for work with Xiaopeng Motors.

In November 2018, Cao was offered a role by Xiaopeng Motors, before that Cao uploading the copies of 300,000 files and directories of Tesla’s Autopilot-related source code which is completely against Tesla’s policies and employment agreements.

Court Statement quoted that Cao created zip files of Tesla’s Autopilot-related source code and he allegedly deleted 120,000 files and disconnected his personal iCloud account from his Tesla-issued computer around December 26.

In the court filing, Cao denied the allegation and defend that he wasn’t involved in the theft of trade secrets but Tesla disagrees and states that he was employed in  “crown jewel of Tesla’s intellectual property portfolio” and that Cao tried to bring these trade secrets to Xiaopeng Motors, his new employer.

Uploaded Telsa Autopilot source code may reveal how Tesla has approached and solved problems in vehicle autonomy and how they used camera and radar to solve problems in autonomous driving.

According to the count fillings, “Cao admits that Tesla’s network and servers are passwords- and firewall-protected and are accessible only to current Tesla employees with proper credentials. Mr. Cao denies the allegations in this paragraph relating to Tesla’s protocols after employees resign or are terminated”

Tesla Also complaints that he access the source code that stored in Tesla’s own server which is protected behind Tesla’s strong firewall.

Mr. Cao also admits that he had access to some information that Tesla considers confidential while he was working at Tesla.

In this case, Cao’s lawyers argue that any source code or other confidential information that remained on his devices after he left Tesla would only be there “as a result of inadvertence.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Read More

Tesla Car Has Been Hacked and Stolen By Intercepting the Signal From Key Fob

Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car & $545,000 in Total – Day 3

Website

Latest articles

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles