Car Companies are now spying on their users through MID!

Almost all the renowned car makers like Honda, Toyota, Ford, GE, and Nissan are said to be keeping a track of their respective users by monitoring their driving habits. Details such as the speed, destination tracking, office location, transit experiences are now being monitored by the car makers which clearly constitutes a privacy breach.

According to a post published in Washington Post, the details of the driving habits are being leaked to the vehicle manufacturers through the Multi-Information Display (MID) which when connected to internet leaks out data to the remote servers.

Usually, a customer buying a car has the privilege to agree or not agree to a stipulation in a buyer’s contract to share details with the car manufacturer. But most of the companies are throwing the contract summary to the wind and are said to be indulging in spying practices.

For example, Honda can easily figure out their car user’s driving data as soon as the user connects their smartphone to the internet for navigation purposes.

General Motors said that it collects data for experimental purposes, but was not ready to provide specifics.
Ford, which is one of the internationally recognized car brands, shared the same as GM.

Toyota was not ready to get exposed to this issue. But it said that the article published in Washington Post was partially true. It added in its statement that the info helps the companies improve features and mileage of the future models. And it does this with their customer’s consent.

All these days, security experts feared that future coming connected cars or automated cars can spell a doom on human race if in case the technology gets exploited by hackers.

But now, the truth is out that all the present day cars manufactured by renowned brands are indulging in spying activities which sets a clear-cut example for breach of privacy.

Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display