Skip to content

Tractor Hacking

Motherboard takes a look into the now common practice that many of America’s farmers are getting into, Tractor Hacking.

To avoid the draconian locks that John Deere puts on the tractors they buy, farmers throughout America’s heartland have started hacking their equipment with firmware that’s cracked in Eastern Europe and traded on invite-only, paid online forums.

Tractor hacking is growing increasingly popular because John Deere and other manufacturers have made it impossible to perform “unauthorized” repair on farm equipment, which farmers see as an attack on their sovereignty and quite possibly an existential threat to their livelihood if their tractor breaks at an inopportune time.

The main argument comes down to ownership. Once a farmer turns the key, they have agreed to John Deere’s TOS.

A license agreement John Deere required farmers to sign in October forbids nearly all repair and modification to farming equipment, and prevents farmers from suing for “crop loss, lost profits, loss of goodwill, loss of use of equipment … arising from the performance or non-performance of any aspect of the software.” The agreement applies to anyone who turns the key or otherwise uses a John Deere tractor with embedded software. It means that only John Deere dealerships and “authorized” repair shops can work on newer tractors.

Many do not agree with this and they end up turning to unlikely sources for an answer.

“If a farmer bought the tractor, he should be able to do whatever he wants with it,” Kevin Kenney, a farmer and right-to-repair advocate in Nebraska, told me. “You want to replace a transmission and you take it to an independent mechanic—he can put in the new transmission but the tractor can’t drive out of the shop. Deere charges $230, plus $130 an hour for a technician to drive out and plug a connector into their USB port to authorize the part.”

“What you’ve got is technicians running around here with cracked Ukrainian John Deere software that they bought off the black market,” he added.

Think of your cell phone, smart tv, car… do YOU own it? Who should have permission to control what goes on it?

 

Full article from Motherboard

Published inhackingSecurity

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *