Pluralistic: 15 Aug 2022

Today's links

A vintage John Deere tractor whose wheel hubs have been replaced with HAL 9000 eyes, matted over a background of the cyber-waterfall image from The Matrix.

This weekend, I watched a hacker jailbreak a John Deere tractor live on stage (permalink)

Last Saturday, I sat in a crowded ballroom at Caesar's Forum in Las Vegas and watched Sickcodes jailbreak a John Deere tractor's control unit live, before an audience of cheering Defcon 30 attendees (and, possibly, a few undercover Deere execs, who often attend Sickcodes's talks).

The presentation was significant because Deere – along with Apple – are the vanguard of the war on repair, a company that has made wild and outlandish claims about the reason that farmers must pay the company hundreds of dollars every time they fix their own tractors, and then wait for days for an authorized technician to come to their farm and type an unlock code.

Deere's claims have included the astounding statement that the farmers who spend hundreds of thousands of dollars on tractors don't actually own those tractors, because the software that animates them is only licensed, not sold:

They've also claimed that locking farmers out of their tractors is for their own good, because otherwise hackers could take over those tractors and endanger the food supply. While it's true that the John Deere tractor monopoly means that defects in the company's products could affect farms all around the world, it's also true that John Deere is very, very bad at information security:

The company's insistence that they are guardians of farmers and the agricultural sector is a paper-thin cover for monopolistic practices and rent-seeking. Monopolizing the repair and reconfiguration of Deere products gives the company all kinds of little gifts – for example, they can refuse to fix the tractors of dissatisfied customers unless they agree to gag-orders:

And because so few of us understand information security, or monopoly, or agribusiness (let alone all three!) they can spin their dangerous, grossly unfair practices as features, not bugs. Remember when they trumpeted the fact that they'd remotely bricked some Ukrainian Deere products that had been looted by Russian soldiers?

What they didn't say – and what almost no one pointed out – was that this meant that anyone who could hack John Deere's system could brick any tractor – including, say, the Russian military's hacking squads. They also didn't say that Ukrainian farmers had long chafed under Deere's corporate control, and had developed illegal third-party tractor firmware that farmers all over the world had covertly installed:

And that means that the Russian looters who supposedly were foiled by Deere's corporate remote killswitches can re-activate their tractors, by using the Ukrainian software developed in response to the company's monopolistic practices.

Which brings me back to Sickcodes and his awesome presentation at Defcon 30 this weekend. I watched from the front row, sitting next to the repair champion Kyle Wiens, founder of Ifixit, who turned his notes into an excellent Twitter thread:

As Kyle points out, Deere has repeatedly told state and federal lawmakers and regulators that farmers can't be trusted to repair or modify their own tractors. This is obviously nonsense: indeed, for decades, Deere product development consisted of sending engineers out to document the improvements farmers had made to their tractors so the company could copy them:

Writing for Wired, Lily Hay Newman provides some great technical details on the hack, including how Sickcodes acquired (and accidentally broke!) several 2630 and 4240 touchscreen control units, eventually demounting the main controller and soldering it into a new board that he used to probe the system:

He discovered that the system was designed to send an extraordinary amount of data to John Deere – his control unit tried to exfiltrate 1.5GB worth of data once he brought it online. He also discovered that as soon as he was able to conjure up a terminal, he had root access to the system.

This was great news for Sickcodes, but it raises serious questions about Deere's information security practices. As Kyle points out, this entire system ran on deprecated, unpatched, elderly GNU/Linux software and Windows CE, an operating system that was end-of-lifed in 2018, and which was so bad that people forced to use it typically called it "Wince."

Sickcodes discovered all kinds of security worst-practices in John Deere's security – even in the parts of its security that were intended to secure the company's profits from its own customers' best interests. For example, at one point Sickcodes put the control unit into maintenance mode by repeatedly rebooting it, so that it refused to allow him to do anything until he brought it to a dealer. He discovered that all it took to convince the computer that he was a dealer was to create an empty text file on its hard-drive whose filename was something like "IAmADealer.txt" (I didn't write down the exact filename, alas, but that's not far off!).

Another revelation from Sickcodes: the company made extensive use of free/open source software but seems to be gravely out-of-compliance with the license terms (I'm told that organizations that do legal enforcement of free/open licenses are now aware of this).

So to recap: the company says it has to block farmers from having the final say over their own tractors because they could create security risks and also threaten Deere's copyrights (the company even claims that locking down tractors is necessary to preventing music infringement, as though a farmer would spend $600k on a tractor so they could streamrip Spotify tracks).

But in reality, the company itself is a dumpster-fire of information security worst practices, whose unpatched, badly configured, out-of-date tractors are a bonanza of vulnerabilities and unforced errors. What's more, the company – which claims to be staunch defenders of copyright – use their copyright locks to hide the fact that they are committing serious breaches of software copyright.

In serious information security circles, it's widely understood that "there is no security in obscurity" – that is, hiding how a system works doesn't make it secure. Usually, this is understood to be grounded in the fact that if you hide your work, you might make mistakes that others would spot and point out to you:

But there's another problem with security through obscurity: when you don't have to show your work to others, you can be sloppy. Whereas, if your work is open to inspection, your own aversion to being seen as slapdash will impose a rigor on your process, which will make the whole thing better:

With Deere's security through obscurity, we see both pathologies on display. The company uses its opacity to commit sloppy security bugs, and also to cover up its violations of copyright law – and then, of course, it accuses its critics of being guilty of those two exact sins. Takes one to know one:

Sickcodes closed out by saying that while his hack required a lot of fiddling with the hardware, he was already scheming to build a little tool that could access and jailbreak a tractor without ripping chips off a board or doing a lot of soldering.

And then he played a custom, farm-themed version of Doom on his jailbroken tractor controller.

(Image: Cryteria, CC BY 3.0, modified)

Hey look at this (permalink)

This day in history (permalink)

#20yrsago Hypercard is back, baby

#20yrsago FBI on warchalking: the sky is falling, halp!

#15yrsago Karl Schroeder: Colonize the Earth

#15yrsago An anonymous Disney employee vandalized the Wikipedia entry on DRM by removing all mentions of me

#15yrsago Catalog of Fox News Wikipedia whitewashes

#15yrsago RIAA stiffs former defendant on legal fees

#15yrsago DRM as a Potemkin village

#15yrsago BBC picketed over use of Microsoft DRM

#15yrsago George Orwell on getting shot

#10yrsago Civil rights implications of Big Data

#10yrsago Hachette to Tor authors: you must keep the DRM on your ebooks

#10yrsago What to do if your car gets broken into and you’re the MPAA

#10yrsago Bain Capital buys profitable American plant, ships it to China; soon-to-be-jobless workers train their overseas replacements

#10yrsago Animation teacher faces the sack for refusing to push “unnecessary, expensive” textbooks at hedge-fund invested Art Institute of California

#10yrsago Kirby Ferguson’s TED Talk: “Embrace the Remix” – a must-see

#10yrsago RIP, Harry Harrison

#10yrsago A Mary Blair Treasury of Golden Books

#10yrsago Neo-Nazi MEP from Hungary discovers he is Jewish

#5yrsago CEOs quit Trump: The 1% can’t win elections unless the 99% turkeys vote for Christmas

#5yrsago A new edition of Daniel Pinkwater’s happy mutant kids’ classic, “Lizard Music”

#5yrsago In NYC, every tenant facing eviction is now entitled to a lawyer

#5yrsago School to parents: a $100 donation gets your kids to the front of the lunch line

#5yrsago Russian inequality is worse than imagined; worse than other post-Soviet states

#5yrsago Republican lawmakers double-down on legalizing the vehicular murder of protesters

#5yrsago The secret text of the GOP’s border bill reveals plan to dramatically increase surveillance of Americans and visitors

#5yrsago Donald Trump will not condemn the terrorist attacks on anti-Nazi protestors

#10yrsago Great writing advice from this year’s Clarion Science Fiction and Fantasy writing workshop

#5yrsago Airbnb’s preferred smart lock vendor accidentally bricks 500 door-locks

#5yrsago Real people don’t (just) need encryption

#5yrsago So the Alt-Right is coming to your campus

#1yrago Provocateur copyrights a Magic: The Gathering Deck

#1yrago End of the line for Reaganomics

#1yrago Smart cities are neither, 2021 edition

Colophon (permalink)

Currently writing:

  • The Bezzle, a Martin Hench noir thriller novel about the prison-tech industry. Friday's progress: 503 words (32266 words total)

  • The Internet Con: How to Seize the Means of Computation, a nonfiction book about interoperability for Verso. Yesterday's progress: 597 words (28575 words total)

  • Picks and Shovels, a Martin Hench noir thriller about the heroic era of the PC. (92849 words total) – ON PAUSE

  • A Little Brother short story about DIY insulin PLANNING

  • Vigilant, Little Brother short story about remote invigilation. FIRST DRAFT COMPLETE, WAITING FOR EXPERT REVIEW

  • Moral Hazard, a short story for MIT Tech Review's 12 Tomorrows. FIRST DRAFT COMPLETE, ACCEPTED FOR PUBLICATION

  • Spill, a Little Brother short story about pipeline protests. FINAL DRAFT COMPLETE

  • A post-GND utopian novel, "The Lost Cause." FINISHED

  • A cyberpunk noir thriller novel, "Red Team Blues." FINISHED

Currently reading: Analogia by George Dyson.

Latest podcast: View a SKU: Let’s Make Amazon Into a Dumb Pipe

Upcoming appearances:

Recent appearances:

Latest book:

Upcoming books:

  • Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, and Get Artists Paid, with Rebecca Giblin, nonfiction/business/politics, Beacon Press, September 2022

  • Red Team Blues: "A grabby, compulsive thriller that will leave you knowing more about how the world works than you did before." Tor Books, April 2023

This work licensed under a Creative Commons Attribution 4.0 license. That means you can use it any way you like, including commercially, provided that you attribute it to me, Cory Doctorow, and include a link to

Quotations and images are not included in this license; they are included either under a limitation or exception to copyright, or on the basis of a separate license. Please exercise caution.

How to get Pluralistic:

Blog (no ads, tracking, or data-collection):

Newsletter (no ads, tracking, or data-collection):

Mastodon (no ads, tracking, or data-collection):

Medium (no ads, paywalled):

(Latest Medium column: "Takes One To Know One

Twitter (mass-scale, unrestricted, third-party surveillance and advertising):

Tumblr (mass-scale, unrestricted, third-party surveillance and advertising):

"When life gives you SARS, you make sarsaparilla" -Joey "Accordion Guy" DeVilla