Solid and V2X: Addressing Cybersecurity Concerns in U.S. DoT National Deployment Plan

Right in the middle of the fresh new announcement of the U.S. vehicle to everything (V2X) deployment plan, is the following brief section on security concerns.

Secure Deployment: Cybersecurity and Privacy Principles Successful V2X deployment requires cyber resilience so its communication services remain available and all users have confidence in the integrity of V2X data as well as trust in the confidentiality of data exchanged via V2X communications. This requires applying principles of secure by design — considering cyber and privacy risks at the outset and integrating cybersecurity principles when V2X is developed and deployed. Secure and resilient V2X depends on investment in cybersecurity and adopting a comprehensive approach to manage and reduce cyber risk.

Cybersecurity is critical to ensure V2X technologies — and the information they provide — can be used and are trusted through standard procedures to validate that information is correct. Secure V2X deployment includes ensuring Personally Identifiable Information (PII) is protected while also allowing parties to secure the data needed to advance a safe and efficient transportation system. Privacy of individuals must be considered and the collection and use of PII and potential PII must align to the purpose of the program. Participants must be informed of privacy practices and provided with understandable notice and provided options for consent. PII collected should be the minimum necessary for the purpose for which it is collected, maintained for the shortest time practical, and not used for any other reason than for which it was initially collected.

The DOT is cognizant that realizing secure V2X deployment requires implementing cybersecurity and privacy principles in a clear and practical way. The ITS Cybersecurity Research Program website documents DOT and modal agencies’ resources. The DOT commits to developing and maintaining cybersecurity resources for the V2X community, as well as a detailed and testable definition of secure V2X deployment in support of this Plan.

Here’s a related presentation about $238M, earmarked for vehicle safety innovation and “foundational” cybersecurity, as described by Federal Highway Administration’s Shailen Bhatt:

The Department of Transportation (DOT) highlights the critical need for cyber resilience, data integrity, and user trust in V2X systems. At first glance, the W3C Solid architecture (solidproject.org) appears to align well with these objectives and offer enhancements. Solid’s decentralized approach to data storage—distributing it across a network of vehicles—and its emphasis on user control over personal information inherently reduce attack surfaces and limit the impact of potential breaches.

A DOT concern clearly is the protection of PII while facilitating essential data sharing to save lives. Solid addresses this balance better than most by allowing users to store data in personal data wallets, which only disclose specific information when and where necessary. This approach adheres to the principle of data minimization for maximum benefit, as V2X applications can request only the data required for their functions. Solid’s permission system ensures that data is used strictly for its intended purpose, as specified during the consent process.

Furthermore, the DOT emphasizes the importance of transparent privacy practices. Solid’s standardized consent mechanisms facilitate clear protocols for data access requests and permissions. Users have the ability to easily view and manage which applications can access their data.

Additionally, Solid’s interoperability aligns well with V2X requirements, enabling seamless data exchange between various systems and stakeholders. This ensures scalability as V2X adoption grows and supports a diverse network of transit vehicles. By enhancing user control over data while meeting data protection requirements, Solid helps build public trust and supports advancements in V2X technologies.

Considering these benefits, V2X-specific extensions to the Solid protocol could be a promising next step. Solid-compatible applications might start with small-scale deployments to validate these advantages (unless Bhatt is serious that he wants to start deploying immediately at scale). The following code example illustrates how vehicles could use Solid to securely share personally controlled location data with nearby vehicles:

import { SolidDataset, Thing, createSolidDataset, setThing } from '@inrupt/solid-client';
import { fetch } from '@inrupt/solid-client-authn-node';
import jwt from 'jsonwebtoken';
import { v4 as uuidv4 } from 'uuid';
import crypto from 'crypto';

// Generate DPoP proof for secure requests
const generateDpopProof = (url, method, privateKey, accessToken = null) => {
  const payload = {
    htu: url,
    htm: method,
    jti: uuidv4(),
    iat: Math.floor(Date.now() / 1000),
    ...(accessToken && { ath: crypto.createHash('sha256').update(accessToken).digest('base64url') })
  };
  return jwt.sign(payload, privateKey, { algorithm: 'ES256', expiresIn: '5m' });
};

// Retrieve access token from token endpoint
const getAccessToken = async (privateKey) => {
  const tokenEndpoint = 'https://oidc-provider.example.com/token';
  const dpopProof = generateDpopProof(tokenEndpoint, 'POST', privateKey);
  const response = await fetch(tokenEndpoint, {
    method: 'POST',
    headers: {
      'Content-Type': 'application/x-www-form-urlencoded',
      'DPoP': dpopProof
    },
    body: new URLSearchParams({
      grant_type: 'client_credentials',
      client_id: process.env.CLIENT_ID,
      client_secret: process.env.CLIENT_SECRET
    })
  });

  if (!response.ok) throw new Error('Token request failed');
  const { access_token } = await response.json();
  return access_token;
};

// Share vehicle location with a recipient URL
const shareVehicleLocation = async (vehicleId, { latitude, longitude }, recipientVehicleUrl) => {
  if (latitude < -90 || latitude > 90 || longitude < -180 || longitude > 180) {
    throw new Error('Invalid coordinates');
  }

  const privateKey = process.env.PRIVATE_KEY;
  const accessToken = await getAccessToken(privateKey);
  const url = `${recipientVehicleUrl}/vehicleLocations/${vehicleId}`;
  const dpopProof = generateDpopProof(url, 'PUT', privateKey, accessToken);

  const thing = new Thing(`vehicle-${vehicleId}`)
    .addLiteral('https://schema.org/latitude', latitude)
    .addLiteral('https://schema.org/longitude', longitude)
    .addDateTime('https://schema.org/timestamp', new Date().toISOString());

  const dataset = setThing(createSolidDataset(), thing);

  const response = await fetch(url, {
    method: 'PUT',
    headers: {
      'Content-Type': 'application/ld+json',
      'Authorization': `DPoP ${accessToken}`,
      'DPoP': dpopProof
    },
    body: JSON.stringify(dataset)
  });

  if (!response.ok) throw new Error('Failed to share location');
  console.log('Location shared successfully.');
};

// Example usage
shareVehicleLocation('V123456', { latitude: 37.7749, longitude: -122.4194 }, 'https://example-vehicle.pod')
  .catch(error => console.error(`Error: ${error.message}`));

Yes, latitude 38 because… go Giants!

The code takes a key aspect of V2X communication, where vehicles can share location data to improve safety and traffic management, and adds a Solid data wallet to store and control access to location information without needing to operate a centralized database. DPoP tokens are shown to prevent unauthorized access and ensure data integrity

Some potential Solid extensions for V2X include specialized ontologies, efficient geospatial queries, and real-time data exchange mechanisms.

Here’s an Intersection OWL Ontology to define some basic classes and properties relevant to V2X interactions, such as vehicles, traffic signals, and signal phases:

@prefix v2x:  .
@prefix schema:  .
@prefix xsd:  .
@prefix owl:  .
@prefix rdfs:  .

# Define the Vehicle class
v2x:Vehicle a owl:Class ;
  rdfs:subClassOf schema:Vehicle .

# Define the hasSpeed property
v2x:hasSpeed a owl:DatatypeProperty ;
  rdfs:domain v2x:Vehicle ;
  rdfs:range xsd:decimal .

# Define the hasDirection property
v2x:hasDirection a owl:DatatypeProperty ;
  rdfs:domain v2x:Vehicle ;
  rdfs:range xsd:decimal .

# Define the TrafficSignal class
v2x:TrafficSignal a owl:Class .

# Define the hasPhase property
v2x:hasPhase a owl:ObjectProperty ;
  rdfs:domain v2x:TrafficSignal ;
  rdfs:range v2x:SignalPhase .

# Define the SignalPhase class with specific instances
v2x:SignalPhase a owl:Class ;
  owl:oneOf (v2x:Red v2x:Yellow v2x:Green) .

# Define the specific signal phases
v2x:Red a v2x:SignalPhase .
v2x:Yellow a v2x:SignalPhase .
v2x:Green a v2x:SignalPhase .

And here’s a Query to a geospatial index to report nearby vehicle status. This example assumes the use of a hypothetical Solid extension for handling geospatial data:

import { SolidGeospatialIndex } from 'hypothetical-solid-v2x-extension';

const cityIndex = new SolidGeospatialIndex('https://city-traffic.example/index');

async function getNearbyVehicles(lat, lon, radius) {
  const query = `
    PREFIX geo: 
    PREFIX geof: 
    SELECT ?vehicle ?lat ?lon
    WHERE {
      ?vehicle geo:lat ?lat ;
               geo:long ?lon .
      FILTER(geof:distance(?lat, ?lon, ${lat}, ${lon}) <= ${radius})
    }
  `;
  
  return cityIndex.query(query);
}

const nearbyVehicles = await getNearbyVehicles(40.7128, -74.0060, 1000);
console.log(nearbyVehicles);

Petty Thief Easily Shattered Tesla Cybertruck “Shatterproof” Window and Stole Contents

It is worth repeating that Tesla infamously marketed their Cybertruck as a $100K survival vehicle to withstand the harshest challenges.

“Armor glass can resist the impact of a baseball at 70 mph or class 4 hail.”

Class 4 hail? Not actually a thing. I’ll get to that in a minute.

Armor glass? Uh huh, a basic lamination that doesn’t mean much. Just like “full self driving” can’t drive, the Tesla armor glass… isn’t.

Elon Musk’s shadow lies beneath his “shatterproof” glass after it was easily shattered in front of a live audience.

Elon Musk said his armor glass that he falsely promoted as “shatterproof” would have a bulletproof option too.

Elon Musk has long claimed the Cybertruck will be bulletproof, saying he wants the futuristic pickup to be “really tough — not fake tough.” […] Thanks to a patent filed by the company in 2021, we know how that “armor glass” works, with several different sheets of glass layered together for strength and flexibility. This “armor glass” won’t be able to stop a bullet — but Musk’s said that Tesla will offer the option to buy a “beast mode” Cybertruck with properly bulletproof windows.

Instead it has delivered a practically worthless dud, which fails tests at every level. Don’t bet your life on this circus clown.

Owners are basically victims of fraud, allegedly still surprised when they realize the lie.

The burglar immediately puts his glass-breaking tool over the windows and shatters the driver’s side glass. Analyzing the footage, the cop can be heard saying, “It’s a tool the thief pushes in the side; look at the top; he pops it…there you go.”

Here, the assailant can be seen grabbing hold of the shattered glass from the top and peeling down the glass to leave the window completely open.

After pulling down the windows, the burglar climbs into the Cybertruck.

Source: Facebook

This comes after a basic hail storm cracked a Cybertruck windshield even as other cars weren’t affected.

CT windshield did not withstand a freak sudden hailstorm in Austin, rest of vehicle seems fine. None of the other cars parked next to it had windshield damage…

Fake tough. The first sign of fraud was Elon Musk incorrectly using a roofing shingle reference for glass on a vehicle.

Hailstones aren’t classified by their size or weight. Class 4 hail refers to the UL2218 Impact Rating test conducted by Underwriters Laboratories (UL), a not-for-profit organization that independently tests and certifies roofing products. […] In order for a roofing product to achieve a Class 4 rating, it cannot show any signs of penetration or fracture after a 2-inch steel ball is dropped twice on the same spot from a distance of 20 feet.

Class 4 rating for roofing products. Not a class of hail. Presumably someone in Elon Musk’s circle mentioned their solar panel roofing business (also fraud) had materials measured relative to Class 4 and he used these same words elsewhere without understanding any of them.

Remember this Elon Musk giant scam about his roof shingle business?

  • Nov 2016: “Musk Says Tesla’s Solar Shingles Will Cost Less Than a Dumb Roof. ‘Electricity is just a bonus.'”
  • May 2017: Elon Musk bets homeowners will pay a premium for resilient panels that look like an ordinary roof.

They’ll cost less! You’ll pay a premium! Up is down. Down is up. They’ll be dumb. They’ll be ordinary. They’ll be so amazingly resilient… whatever, whenever, all lies all the time in constant contradictions.

In reality a 2-inch steel ball is supposed to be dropped twice. On the same spot. From 20 feet. It’s science, meant for roofing material comparisons yo!

And now this. A 2-inch steel ball thrown like a PT Barnum show…

Tesla promised shatterproof and even bulletproof glass. Then their chief designer Franz von Holzhausen gently attempted a roofing material test sideways and without any force… and smashed it.

“My Good Friend is Black”: Elon Musk Gives Racist Response to Concerns About Twitter Racism

I’ve covered this before, when Elon Musk uses the “some of my best friends are” defense. It’s wrong to use for many well known and studied reasons, including being clearly racist.

Here’s yet another example of him using it, as if he really doesn’t care.

The forthcoming book Character Limit: How Elon Musk Destroyed Twitter, by New York Times reporters Kate Conger and Ryan Mac, relates an awkward scene in which Musk tried to assure the CEO of Revolt, a media company founded by Combs, about the surge in racist content that accompanied his appointment to chief executive at Twitter. (Combs sold his stake in Revolt this summer.) Detavio Samuels, the head of that company, was worried that Black users would be assailed by hate speech. Musk deflected by saying, “I don’t know if you know this, but Puff [one of Combs’ former stage names] is an investor in Twitter.” He added, “You know, he’s a good friend of mine. We text a lot.”

As I have been saying since 2022, the Twitter takeover never was about direct revenue. It was a calculated loss — cost of disinformation — to benefit racist tyrants who almost instantly implemented targeted censorship on the global propaganda platform.

Elon Musk used billions to elevate toxic narratives for Saudis and Russians. Thus asking Musk for a Twitter profit plan is like asking who makes money when Russia drops bombs on billboards in Ukraine. Forget advertising.

The buried lede in the article is that Putin’s elites are behind the Twitter purchase and reorganization, specifically two 8VC henchmen named Petr Aven and Vadim Moshkovich.

The founder of 8VC, also known for his conflict generating Nazi-affiliated Palantir, has responded officially to criticism of these two by stating he is a “better” man than anyone else, one who trusts only his own judgement in hiring Putin’s soldiers (Source: Twitter).

That’s the unmistakable voice of tyranny. “Lesser men” are defined as those who disagree with a man who only listens to those who agree with him.

But let me be even more clear here about the horrible racism allegedly in 8VC culture. The founder literally has been saying a candidate for hire shouldn’t be accountable for their family, let alone their country politics, history or culture.

The narrative is that “lesser men” wouldn’t take the big risk to hire a Russian prince out of Putin’s inner circle of billionare jerks to land him a plumb job, because this 8VC founder doesn’t take important background stuff into consideration.

Ok? That sounds awful. Even worse, when you follow the logic presented and look at his publicly stated position on why he doesn’t hire non-whites… there’s a huge glaring racist double-standard.

Who has the courage to talk about broken Russia? Not this guy. He’ll say he hates Putin, as if Putin doesn’t lap that up, and that’s it.

Meanwhile…

He’s saying Black candidates carry a huge burden and responsibility for their entire country’s history if they expect to get hired by him. That is unless they’re Russian, in which case nothing about their father’s direct role in a oppressive dictatorship is worth talking about.

Who wants to bet hiring Putin’s henchmen’s kids is an investment loophole, where laundered coins magically get invested into American companies, to help Russia fund the invasion of Ukraine if not fund anti-American propaganda? We’ve seen this before.

The nativist America First campaign from the late 1800s worked hard to undermine democracy. By the 1930s it was a domestic front for Nazism.

Lonsdale’s Palantir people literally still promote nativist “America First” as if their shrill bugle call of racism isn’t obvious.

Palantir Technologies co-founder Joe Lonsdale… donated to a new super-political action committee supporting Donald Trump… Jacob Helberg, a Palantir executive and big Trump donor, said Vance was “a pro-technology and pro-America First pick…

Allegedly these slogans are how Palantir executives and their VC friends raise money for Trump’s plans to eliminate government regulation of public safety

We’re supposed to believe 8VC can’t hire American Black people because of so many big picture societal concerns. Palantir founder tells us he blames the big picture for his pattern of discrimination against Blacks.

Ok sure, everyone sees Elon Musk pumping babies out of wedlock to save the planet but every Black candidate has to explain why children born out of wedlock are bad for the planet?

Meanwhile, an avowed foreign enemy leader’s boy was brought into the 8VC team during high war-time sanctions because… just an America First angel unto himself.

Laundering never looked so dirty.

UK Sticker Nazis Jailed for Antisemitic Speech

A case in the UK is being widely reported, as the justice system wisely is cracking down on extreme hate speech.

“Whilst your activity ceased in 2021, recent events in the United Kingdom demonstrate that there is, for the first time since the 1930s, a real risk of gross, potentially violent, antisemitism becoming normalised on our streets.

“The publication of this kind of material is corrosive to our society and highly damaging. Antisemitism, in particular, is a destructive force. It has been used before to tear at the heart of Western democracy. It must not be allowed to do so again.”

[…]

[Judge Bayliss] told the defendant: “You were engaged in a campaign of hatred against minority communities and you were, I am sure, quite deliberately trying to stir up racial hatred.” […] “How you could have thought that to distribute [white supremacist slogans] and have them plastered on public infrastructure without committing a criminal offence is impossible to believe.”

The defendant said he totally thought it was just a normal conversation to post things in public like his belief Muslim immigrants are genocidal “rape gangs“.

That’s just an admission of guilt, really, because Nazis view extreme hate speech and incitement to racist violence as normal “centrist” conversation, which it’s obviously not.

Nobody in their right mind (pun not intended) believes Nazism on Twitter is anywhere even close to center.

Or as @SmoothDunk put it on Twitter about the guy who bought Twitter using Russian and Saudi money…