How to Steal a Tesla and What You Should Do to Protect Yourself

With this one trick anyone can steal a Tesla. One way to protect yourself is with a VPN service. Go to to get 75% off a 3 year plan and use code TESLANOMICS for an extra month for free!

Subscribe here –

Checkout Pat’s channel here

// Credits
Tesla being stolen –
Hacking contest –
Chromium update –
% of people reusing passwords –,%20Sept.%202017%20%E2%80%93%20Oct.%202018.pdf

Num of data breaches –

Have I Been Pwnd –

Interested in a Data Career? Check out my free course

Ready to go Solar? Calculate your cost here –

// Want more Tesla videos? Check out my friend’s channels here:
Like Tesla
Now You Know
Hyperchange TV
Sean Mitchell

// Things I Use for my Tesla
Tezlab (track efficiency and trips) –
WashMist (waterless washing) –

// Music by Epidemic Sound

// Disclaimer
This video and channel are not affiliated with Tesla nor did they endorse this specific production.

I may earn a small commission for my endorsement, recommendation, testimonial, and/or link to any products or services linked above. Your purchase helps support my work in bringing you the data and analytics behind the world.

// Tesla Security (

Tesla values the work done by security researchers in improving the security of our products and service offerings. We are committed to working with this community to verify, reproduce, and respond to legitimate reported vulnerabilities. We encourage the community to participate in our responsible reporting process. To register as a pre-approved, good-faith security researcher and register a vehicle as a research-registered vehicle, please submit requests to [email protected]
For vehicle or energy product

While we use Bugcrowd as a platform for rewarding all issues, please report vehicle and product related issues directly to [email protected], using our PGP key to encrypt reports containing sensitive information.
Third-party bugs

If issues reported to our bug bounty program affect a third-party library, external project, or another vendor, Tesla reserves the right to forward details of the issue to that party without further discussion with the researcher. We will do our best to coordinate and communicate with researchers through this process.
Responsible Disclosure Guidelines

We will investigate legitimate reports and make every effort to quickly correct any vulnerability. To encourage responsible reporting, we will not take legal action against you nor ask law enforcement to investigate you provided you comply with the following Responsible Disclosure Guidelines:

Provide details of the vulnerability, including information needed to reproduce and validate the vulnerability and a Proof of Concept (POC). Any vulnerability that implicates functionality not resident on a research-registered vehicle must be reported within 168 hours and zero minutes (7 days) of identifying the vulnerability.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services.
Do not modify or access data that does not belong to you.
Give Tesla a reasonable time to correct the issue before making any information public.
Alter only vehicles that you own or have permission to access.
Do not compromise the safety of the vehicle or expose others to an unsafe condition.
Security research is limited to the security mechanisms of the Infotainment binaries, Gateway binaries, Tesla-developed ECU’s, and energy products.

Tesla appreciates and wants to recognize the contributions of security researchers. If you are the first researcher to report a confirmed vulnerability, we will list your name in our Hall of Fame (unless you would prefer to remain anonymous). You may also be considered for an award if you are the first researcher to report one of the top 3 confirmed vulnerabilities in a calendar quarter. You must comply with our Responsible Disclosure Guidelines (above)