Salta al contenuto principale


Podcast: The (Hacked) Spy In Your Car


A massive hack of a popular dashcam company; the sentencing of someone Sam has covered for years; and the mass firings around Charlie Kirk's assassination.

We start this week with Joseph’s investigation into Nexar, a popular dashcam company that was catastrophically hacked. Nexar is also uploading user footage to a publicly available map without some drivers’ knowledge. After the break, Sam tells us about her trip to San Diego to cover the sentencing of someone she has covered for years. In the subscribers-only section, we talk about the Charlie Kirk assassination and our reporting around that.
playlist.megaphone.fm?e=TBIEA3…
Listen to the weekly podcast on Apple Podcasts,Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.
youtube.com/embed/-51f4patIkw?…


This Company Turns Dashcams into ‘Virtual CCTV Cameras.’ Then Hackers Got In


A hacker has broken into Nexar, a popular dashcam company that pitches its users’ dashcams as “virtual CCTV cameras” around the world that other people can buy images from, and accessed a database of terabytes of video recordings taken from cameras in drivers’ cars. The videos obtained by the hacker and shared with 404 Media capture people clearly unaware that a third party may be watching or listening in. A parent in a car soothing a baby. A man whistling along to the radio. Another person on a Facetime call. One appears to show a driver heading towards the entrance of the CIA’s headquarters. Other images, which are publicly available in a map that Nexar publishes online, show drivers around sensitive Department of Defense locations.

The hacker also found a list of companies and agencies that may have interacted with Nexar’s data business, which sells access to blurred images captured by the cameras and other related data. This can include monitoring the same location captured by Nexar’s cameras over time, and lets clients “explore the physical world and gain insights like never before,” and use its virtual CCTV cameras “to monitor specific points of interest,” according to Nexar’s website.

This post is for subscribers only


Become a member to get access to all content
Subscribe now